Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Securing your infrastructure - how do you do it?

Status
Not open for further replies.

zamkh

MIS
Sep 24, 2008
8
0
0
GB
Hi,

Me again. I attended a very interesting seminar this week on Infrastructure qualification and it's brought up a few questions as to how we approach security (both physically and logically).

At our site, we have physically seperate switches/firewalls/networks/PCs for our 'internal' network and a seperate network with its own set of switches / firewalls / PCs / Servers for Internet Access. Yes, complicated, expensive, but in a way does give you 'peace of mind'. Wireless networks are not used or allowed in our buildings.

Of course, nearly all of our floor points are plugged into our Nortel switch stacks regardless of whether they are being used or not, which now could pose a risk - a visitor could come in, plug in a laptop or other device and be handed an IP address which would then allow him to do what he wants. Our physical security prevents him from doing this, as visitors are normally always accompanied, but if one had to look at the fact that most hacks come from people inside the organisation, then we need to look at this in a different light.

So now that we think about it, we have thought about 3 ways in which to secure this aspect. Each of course has its limitations with regards to admin time, etc.

1) We validate all equipment on the network (maybe outside the server room) and then define those MAC addresses which we populate into the Switch stacks and only they are allowed to connect to the network. But this would probably equate to nearly 1300 MAC addresses being loaded into switch stacks - can the 5510 switch stacks handle this kind of load?

2) Do the same thing with MAC address, but somehow use DHCP to do a similar thing - but this may not be possible as that's too many reservations to create.

3) Other ideas include removing patch leads plugged into floor ports and then also from the patch points to nortel switchs for all 'dead' ports and if someone joins or leaves the company only then do we patch in those cables.

All of them or a blended implementation of all three will entail us changing our methods, but are they feasible and is there a better idea that you have?

 
Nortel's NSNA product might be something to look at. You can have a client on the PC which authenticates against a RADIUS server/Active Directory. Once the credentials are verified, the NSNA box changes the VLAN assignment of the port the PC is connected to and gives varying levels of access based on the permissions granted to that user and/or VLAN.

It goes much deeper than that. Below is a link that explains more.

 
Thanks biv343.

I will definitely give that an indepth study as we a busy evaluating an endpoint solution from our VPN suppliers. They could go nicely together.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top