Tips: Map Your Network For Better Protection

| | No TrackBacks
In a large intranet with thousands (or mroe) devices the primary goal is to maintain a  decent security level. It's quite hard to find an unauthorized (rogue) device connected in case the administrative policy is of permissive type.

In another words, if it is assumed that any device online is a legitimate ones and belongs to someone authorized, it's hard to maintain security, even if all the data access attempts are properly logged and checked.

It is advised to have a complete map of network activity; all the MAC addresses, IP addresses assigned etc. must be regularly gathered and studied for unknown entries. All the devices must be registered and there should be an easy way to detect whether a given MAC address belongs to a legitimate device.

And, finally, the default administrator's policy towards new or unknown devices must be to forbid access to intranet resources. Although it could require slightly more work to check every such a case, it would prevent serious security issues in the long run.

Constant network monitoring within intranet is also a must to keep an acceptable level of security.

No TrackBacks

TrackBack URL: /blog/mt-tb.cgi/52

blog comments powered by Disqus

About this Entry

This page contains a single entry by Konstantin Boyandin published on December 22, 2009 7:15 PM.

Tips: Preventing Rogue DHCP Clients was the previous entry in this blog.

How To: Uninstall Applications In Safe Mode is the next entry in this blog.

Find recent content on the main index or look in the archives to find all content.