Avaya Quick-Starting Routers and BNX Platforms Bedienungsanleitung Seite 102

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 120
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 101
Quick-Starting Routers and BNX Platforms
11-16
1.
Delete the “public” community and create a read/write community with
its own name (for example, WFSM) and a manager list containing the IP
addresses of the Site Manager workstations that need access to the router
or BNX platform.
2. Reconfigure the “public” community to be read-only with universal
access.
See Configuring Routers or Configuring Customer Access and Trunks (BNX
Software) for instructions on how to perform these two steps.
Setting Secure Mode
Bay Networks routers or BNX platforms have an optional security mechanism for
all SNMP SET requests. This proprietary mechanism solves some of SNMP’s
security problems until a stable, widely accepted, industry-standard security
solution is available.
When you enable the security mechanism, the router or BNX platform operates in
secure mode. In secure mode, a Site Manager SET request to the router or BNX
platform includes the encrypted value of a counter. When the agent on the router
or BNX platform receives the SET request, it compares the encrypted value with
the value of its own counter plus one. If the 2 counters match, the agent considers
the SET request authentic, increments the counter by 2, stores it in an encrypted
form in the MIB, and sends it back to Site Manager.
The security mechanism protects against these security violations:
Message stream modification, in which an intruder reorders, delays, or replays
SET requests to specify unauthorized management settings
Masquerade operations, in which an intruder assumes the identity of an
authorized party to specify unauthorized management settings
The security mechanism does not protect against the following security violations,
which are beyond the scope of our proprietary interim security system:
Modification of information, in which an intruder intercepts a packet, modifies
its contents, and reinserts it into the message stream before the agent’s counter
is incremented
Disclosure, in which an intruder observes which variables are being set
Seitenansicht 101
1 2 ... 97 98 99 100 101 102 103 104 105 106 107 ... 119 120

Kommentare zu diesen Handbüchern

Keine Kommentare