2Securing Network Devices
This chapter studies the following topics:
- – the types of network traffic:
- - the management plane,
- - the control plane,
- - the data plane;
- – securing the management plan:
- - securing passwords,
- - implementing connection restrictions,
- - securing access through control lines, VTY and auxiliaries,
- - assigning administrative roles: protecting access using privilege levels;
- – protecting access through the management of “views” and “super-views”:
- - securing configuration files and the system,
- - using automated security features;
- – securing the control plan.
2.1. Types of network traffic
Cisco has categorized the different types of network traffic into different “planes” of communication. It has defined three such planes: the management plane, the control plane and the data plane.
- – the management plane: this includes traffic used by a network administrator to configure network devices. It is generally made up of protocols, such as Telnet, SSH and SNMP;
- – the control plane: this includes traffic between the network devices, transmitted to each other for discovery and/or for automatically configuring the network, such as the traffic of updating routing protocols or ARP protocol, for instance.
- – the data plane: this is the actual traffic of end users in the network.
2.2. Securing the management plan
Securing the management plan includes, among others, the following:
- – applying a secure password policy;
- – securing console, VTY and auxiliary access; ...
Get Computer Network Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.