Posts Tagged ‘authentication’

Ensuring Adequate Security for Console Terminal Server Applications

Wednesday, November 2nd, 2011

A console terminal server can provide network administrators with a convenient tool for out-of-band access to console port command functions on vital network elements located at remote network equipment sites. Although this capability can prove to be extremely helpful when dealing with network outages caused by malfunctioning network devices at remote sites, it can also sometimes create a bit of a worry, security-wise, due to the very nature of out-of-band management capabilities.

(more…)

IP Address Filtering – A Versatile Security Feature for Console Servers

Thursday, September 1st, 2011

When used properly, a console server can provide network administrators with a broad array of powerful tools that can be used to manage remote network elements, monitor conditions and events at remote network equipment sites and access console port command functions on remote network equipment. As is often the case though, these powerful tools also have a harmful potential if they are available for access by the wrong people. With this in mind, it’s easy to see how important security and authentication measures are to any console server product, and that in many cases, the more layers of security that are available to protect the console server, the better.

(more…)

Callback Security – Effective Authentication for Dial-up Out of Band Communication

Thursday, July 21st, 2011

An out of band management (http://www.wti.com/c-45-out-of-band-management.aspx) solution can provide network administrators with a convenient, reliable means to communicate with remote network devices when communication via network is not available. Although out of band communication is a vital element in many remote network equipment management applications, in most cases, out of band management solutions rely on a dial-up modem connection between the administrator and the out of band management unit.

(more…)

The Remote Reboot Switch – An Economical Way to Deal with Problems at Remote Equipment Racks

Wednesday, July 6th, 2011

Often, problems with many network elements can be solved with a simple power reboot. While a power reboot is a relatively simple task to perform when the network element in question is located nearby, it can be a whole different game if a malfunctioning network element at a remote equipment rack, miles away from your office, needs to be rebooted. It’s wasteful and inefficient to send a service team on a long journey to reboot a network element at a remote site; in cases like this, the most practical solution is a remote reboot unit, installed at the remote equipment rack.

(more…)

Secure Out of Band Access to Console Port Command Functions on Remote Network Elements

Monday, June 13th, 2011

It’s pretty hard to imagine how difficult it must have been to maintain and service remote network devices before the advent of out of band management. Not too long ago, before the concept of out of band management was widely embraced, the only way to deal with a troublesome network element at a remote equipment site was to travel to the equipment site in person and initiate a power reboot or invoke a few quick console port commands in order to get a troublesome network element up and running again. For a large part, out of band management has almost completely eliminated the need for IT support personnel to be constantly on the road traveling from remote site to remote site, just to reboot misbehaving devices or change a few configuration parameters.

(more…)

A Serial Console Server Saves Both Time and Money

Wednesday, June 1st, 2011

Not too many years ago, the only way to deal with a crashed server or router at a remote network equipment site was to send your tech support team off on a long, expensive road trip to the remote site, and when they finally got there, the problem could often be solved by merely entering a few simple commands via the console port on the remote device. Not only was this type of solution prohibitively expensive, but you were often left without network communication until the tech support team finally arrived at the remote equipment site and took care of the problem. Today, this type of solution to a problem at a remote equipment site has become increasingly rare, thanks to the out of band management capabilities provided by a serial console server.

(more…)

Authentication Protocols Provide Additional Security for Console Server Management Applications

Wednesday, May 11th, 2011

When implementing an out of band management solution, it’s important to make certain that remote access to console port command functions is adequately protected. Obviously, this means that your console server management (http://www.wti.com/c-40-console-server-management.aspx) unit should include basic security features such as password protection. But in order to properly ensure that sensitive command functions are protected from unauthorized access, your console server management device should also support one or more of the popular remote authentication protocols.

(more…)

Out of Band Management – A Secure, Reliable Way to Deal with Problems at Remote Network Equipment Sites

Monday, May 2nd, 2011

When a network element at a remote installations site malfunctions, the last thing you want to do is send your IT support team off on an expensive, time consuming trip to visit the site in person. Not only are truck rolls and service calls often a waste of time and money, but if your remote network equipment site includes an out of band management solution with adequate security and authentication measures, then a service call is often completely unnecessary.

(more…)

Toshiba Self-Encrypting Hard Drives with Host Authorization

Wednesday, April 20th, 2011

This is a great idea; it’s kind of surprising that this feature isn’t more wide spread …

The best way to protect data on one of your storage devices is to encrypt it. There are several free solutions out there, for instance by using the Open Source encryption software True Crypt, to protect data from unauthorized access.

(more…)