Solved

securing direct network connection

Posted on 2013-06-30
3
279 Views
Last Modified: 2013-07-03
Dear experts,

I have 2 servers in data center connected directly to each other for backup data. Unfortunately there is physical access to it.

Scenario:
Server A (server 2008, two ethernets):
eth1: internet
eth2: direct connection to server B, network sharing enabled

Server B (server 2008 R2, two ethernets):
eth1: internet
eth2: direct connection to server A, network sharing enabled

There is daily backup (Windwos server backup) to each other.

What is the best practice to secure it?


Regards,
Jarda
0
Comment
Question by:JardaCZ
  • 2
3 Comments
 
LVL 17

Expert Comment

by:surbabu140977
ID: 39288448
Physical access will always be there for authorized people in the datacenter. Cannot prevent that. Even if you use a lock and key someone got to have the key. : )
0
 
LVL 7

Author Comment

by:JardaCZ
ID: 39288477
yep, there is always some cyber enemy :)

I may have asked the wrong question.. I thought what can I do in OS against people who disconnected the cable and connect it to their notebook.
1, they do not know IP (I do not use DHCP, there is no default gateway either)
2, they do not know sharing password

Is man in the middle threat for me?
Should I use some encryption or certificate?


Regards,
Jarda
0
 
LVL 17

Accepted Solution

by:
surbabu140977 earned 500 total points
ID: 39296672
port security with static mac address mapping in your switch. So even if they pull out the cable, their notebook won't connect.

Best,
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Configuring network clients can be a chore, especially if there are a large number of them or a lot of itinerant users.  DHCP dynamically manages this process, much to the relief of users and administrators alike!
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now