B: Security Considerations; Security Practice; Factors Affecting Security - Lantronix SecureLinx SLC8 User Manual

Console manager (slc)
Hide thumbs Also See for SecureLinx SLC8:
Table of Contents

Advertisement

B
:
S
e
c
u
B
:
S
e
c
u
The SLC provides data path security by means of SSH or Web/SSL. Even with the use of
SSH/SSL, however, do not assume you have complete security. Securing the data path
is only one measure needed to ensure security. This appendix briefly discusses some
important security considerations.

Security Practice

Develop and document a Security Practice. The Security Practice should state:

Factors Affecting Security

External factors affect the security provided by the SLC, for example:
SecureLinx SLC User Guide
r
i
t
y
C
o
n
s
i
d
r
i
t
y
C
o
n
s
i
d
The dos and don'ts of maintaining security. For example, the power of SSH and
SSL is compromised if users leave sessions open or advertise their password.
The assumptions that users can make about the facility and network
infrastructure, for example, how vulnerable the CAT 5 wiring is to tapping.
Telnet sends the login exchange as clear text across Ethernet. A person
snooping on a subnet may read your password.
A terminal to the SLC may be secure, but the path from the SLC to the end
device may not be secure.
With the right tools, a person having physical access to open the SLC may be
able to read the encryption keys.
There is no true test for a denial-of-service attack—there is always a legitimate
scenario for a request storm. A denial-of-service filter locks out some high-
performance automated/scripted requests. The SLC will attempt to service all
requests and will not filter out potential denial–of-service attacks.
e
r
a
t
i
o
n
s
e
r
a
t
i
o
n
s
252

Advertisement

Table of Contents
loading

This manual is also suitable for:

Securelinx slc16Securelinx slc32Securelinx slc48

Table of Contents