?
Solved

securing direct network connection

Posted on 2013-06-30
3
Medium Priority
?
292 Views
Last Modified: 2013-07-03
Dear experts,

I have 2 servers in data center connected directly to each other for backup data. Unfortunately there is physical access to it.

Scenario:
Server A (server 2008, two ethernets):
eth1: internet
eth2: direct connection to server B, network sharing enabled

Server B (server 2008 R2, two ethernets):
eth1: internet
eth2: direct connection to server A, network sharing enabled

There is daily backup (Windwos server backup) to each other.

What is the best practice to secure it?


Regards,
Jarda
0
Comment
Question by:Jaroslav Latal
  • 2
3 Comments
 
LVL 17

Expert Comment

by:surbabu140977
ID: 39288448
Physical access will always be there for authorized people in the datacenter. Cannot prevent that. Even if you use a lock and key someone got to have the key. : )
0
 
LVL 7

Author Comment

by:Jaroslav Latal
ID: 39288477
yep, there is always some cyber enemy :)

I may have asked the wrong question.. I thought what can I do in OS against people who disconnected the cable and connect it to their notebook.
1, they do not know IP (I do not use DHCP, there is no default gateway either)
2, they do not know sharing password

Is man in the middle threat for me?
Should I use some encryption or certificate?


Regards,
Jarda
0
 
LVL 17

Accepted Solution

by:
surbabu140977 earned 1500 total points
ID: 39296672
port security with static mac address mapping in your switch. So even if they pull out the cable, their notebook won't connect.

Best,
0

Featured Post

A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question