Solved

securing direct network connection

Posted on 2013-06-30
3
286 Views
Last Modified: 2013-07-03
Dear experts,

I have 2 servers in data center connected directly to each other for backup data. Unfortunately there is physical access to it.

Scenario:
Server A (server 2008, two ethernets):
eth1: internet
eth2: direct connection to server B, network sharing enabled

Server B (server 2008 R2, two ethernets):
eth1: internet
eth2: direct connection to server A, network sharing enabled

There is daily backup (Windwos server backup) to each other.

What is the best practice to secure it?


Regards,
Jarda
0
Comment
Question by:Jaroslav Latal
  • 2
3 Comments
 
LVL 17

Expert Comment

by:surbabu140977
ID: 39288448
Physical access will always be there for authorized people in the datacenter. Cannot prevent that. Even if you use a lock and key someone got to have the key. : )
0
 
LVL 7

Author Comment

by:Jaroslav Latal
ID: 39288477
yep, there is always some cyber enemy :)

I may have asked the wrong question.. I thought what can I do in OS against people who disconnected the cable and connect it to their notebook.
1, they do not know IP (I do not use DHCP, there is no default gateway either)
2, they do not know sharing password

Is man in the middle threat for me?
Should I use some encryption or certificate?


Regards,
Jarda
0
 
LVL 17

Accepted Solution

by:
surbabu140977 earned 500 total points
ID: 39296672
port security with static mac address mapping in your switch. So even if they pull out the cable, their notebook won't connect.

Best,
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question