Popular Posts

Sunday, 25 March 2012

Network Security Notes: Seven Steps To Securing Your Industrial Network

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Network Security Notes: Seven Steps To Securing Your Industrial Network

This post I would like to share you about securing your industrial network that introduced by Tofino...

Eric Byres, CTO of Byres Security, presents the seven steps to industrial-strength security with Tofino™.


0:03 - Tofino - The Industrial Security Solution - Eric Byres gives a brief overview of some of the issues with today's firewalls, and introduces the Tofino Industrial Security Solution.

1:14 - Step 1: Plug and Play Installation - No plant downtime, No special training required for installation.

1:46 - Step 2: Discover Tofino - Have your Tofino report in with only a couple mouse clicks.

1:55 - Step 3: Customize Tofino - Deploy multiple security functions with one appliance.

2:11 - Step 4: Examine Your Network and Diagram it - Using Tofino allows you to map your network and build a diagram.

2:20 - Step 5: Command Your Tofino - Having specialized IT knowledge or command line programming is not required, and most human errors are avoided.

2:44 - Step 6: Test Mode - With test mode, there are no process upsets and traffic is allowed through, but Tofino notes which traffic would have been blocked based on the rules that were set.

3:05 - Step 7: Protect Your Plant - Protect your plant with no interruptions to the network and no downtime.

3:34 - Tofino Industrial Security Solution Key Components - Eric Byres explains the three key components - Security Appliances, Loadable Security Modules, and Central Management Platform.



Other sites you may want to see:

WWE: http://visa-wwe.blogspot.com/
The Kingdom of Wonder: http://welcome2cambodia.blogspot.com/
Daily Blogging: http://visablogging.blogspot.com/
Love Sharing: http://visa-love.blogspot.com/
NetworkSecurity: http://networksecuritynotes.blogspot.com/
About Insurance:http://visa-insurance.blogspot.com
All about Love: http://visa-love.blogspot.com/
Learning English Online: http://visa-elb.blogspot.com/
Discovery Internet: http://visa-isp.blogspot.com/

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Friday, 2 March 2012

Network Security Notes: Secure Your Network Routing with Suppressing Route Advertisements

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Network Security Notes: Secure Your Network Routing with Suppressing Route Advertisements

In network configuration, especially with router configuration, I'm sure that you are familiar with the word route advertisements. To make other network node can learn from your network, you have to advertise your network route by using any suitable network routing protocol. Otherwise,for security reason, you should be aware of which interface of your router should be configured with allowing route update being sent.

To prevent other routers on a network from learning about routes dynamically, you can prevent routing update messages from being sent out a router interface. To accomplish this, use the passive−interface <interface> routing process configuration command. This command can be used on all IP−based routing protocols except for the Exterior Gateway Protocol (EGP) and Border Gateway Protocol (BGP). When an interface is configured to be in a passive state, the router disables the passing of routing protocol advertisements out of the interface; however, the interface still listens and accepts any route advertisement that is received into the interface. Configuring this on a router essentially makes the router a silent host over the interfaces that were specified. To configure an interface as passive, use the passive−interface <interface> command under routing protocol configuration mode; this command is all that is needed to make an interface no longer advertise networks.

Here is an example of configuring an interface as passive:

interface FastEthernet0/1
ip address 10.10.10.1 255.255.255.0
!
interface Serial0/1
ip address 192.168.100.2 255.255.255.252
!
router eigrp 100
passive−interface FastEthernet0/1
passive−interface Serial0/1
!

How Does the Passive Interface Feature Work in EIGRP?

With the passive-interface command, you can use it to control the advertisement of routing information. The command enables the suppression of routing updates over some interfaces while it allows updates to be exchanged normally over other interfaces.

With most routing protocols, the passive-interface command restricts outgoing advertisements only. But, when used with Enhanced Interior Gateway Routing Protocol (EIGRP), the effect is slightly different. The use of the passive-interface command in EIGRP suppresses the exchange of hello packets between two routers, which results in the loss of their neighbor relationship. This stops not only routing updates from being advertised, but it also suppresses incoming routing updates in your network.

Other sites you may want to see:

WWE: http://visa-wwe.blogspot.com/
The Kingdom of Wonder: http://welcome2cambodia.blogspot.com/
Daily Blogging: http://visablogging.blogspot.com/
Love Sharing: http://visa-love.blogspot.com/
NetworkSecurity: http://networksecuritynotes.blogspot.com/
About Insurance:http://visa-insurance.blogspot.com
All about Love: http://visa-love.blogspot.com/
Learning English Online: http://visa-elb.blogspot.com/
Discovery Internet: http://visa-isp.blogspot.com/

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!