Site icon Ananova Business Web Hosting

Network Hardware Security To Defend Business Processes

Network Hardware SecurityNetwork Hardware Security is increasingly becoming critical as the industry moves into IoT and 5G. It's an essential part of evolved networks where security functions, policies, and related configurations get dynamically deployed and adjusted across multi-vendor domains. The network hardware technology should help to defend critical business processes against attack and disruption, protect privacy, and support policy and regulatory compliance controls.

Switches, hubs, and routers are main network hardware components, which act as a gateway for user communication to the outside world. They are the single point of failures, hence to avoid their compromise some common security measures are applied.

Steps to take for Network Hardware Security

Network Hardware Security of some well-known devices

Compaq Netelligent Unmanaged Hub

It offers connectivity by creating mini LAN with two or more peripheral devices in medium and large businesses. At a very affordable price, with high performance and reliability LAN connectivity is provided. The devices have multicolored LED's indicating overall status including power, link, collision, port partition, and port traffic. It has network utilization monitor which indicates the network's performance for easy management and troubleshooting. Furthermore, designed to monitor and keep a hub operating near maximum efficiency.

Security Issue: The default password for superuser is well known, which is required to be changed.

3Com switches

Serves intelligent endpoint in a network requiring high performance, QoS, and enterprise-level security and management. Links wireless and wired voice and data networks in small and medium-size businesses with inexpensive convergence. All models equipped with copper and small form-factor pluggable Gigabit uplinks and clustered stacking capabilities, which allow clustered switches configurations up to 32 units.

Security Issue: The maintenance login (debug) and password (synnet) is widely known for its various switches, CoreBuilder and SuperStack.

Ericsson Tigris

The Ericsson RAN Security solution provides built-in IPsec (Internet Protocol Security) protection through authentication and encryption for the broader network infrastructure. The solution comprises a Security Gateway, public key infrastructure systems, and certificate management.

Ericsson Security Manager provides unique policy-driven security orchestration and management coupled with its powerful analytics capabilities.

Security Issue: In Previous versions, Remote-Access Login Failure Vulnerability was there, which got fixed in recent Tigris OS software release. The vulnerability allows remote users to send valid commands without authenticating them.

Ascend Pipeline/MAX

Security Issue: Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response. Attackers can cause a denial of service with a malformed packet to the discard port, used by the Java Configurator tool.

Breezecom adaptors

Security Issue: It used hard-coded passwords, now widely distributed. Although, it enables the support team to access BreezeCOM equipment.

Cisco IOS

It's security integrated into the network and is a critical component of the Cisco Self-Defending Network. The software delivers a sophisticated set of security capabilities for a comprehensive, layered security approach throughout your network infrastructure.

Exit mobile version