?
Solved

securing direct network connection

Posted on 2013-06-30
3
Medium Priority
?
290 Views
Last Modified: 2013-07-03
Dear experts,

I have 2 servers in data center connected directly to each other for backup data. Unfortunately there is physical access to it.

Scenario:
Server A (server 2008, two ethernets):
eth1: internet
eth2: direct connection to server B, network sharing enabled

Server B (server 2008 R2, two ethernets):
eth1: internet
eth2: direct connection to server A, network sharing enabled

There is daily backup (Windwos server backup) to each other.

What is the best practice to secure it?


Regards,
Jarda
0
Comment
Question by:Jaroslav Latal
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 17

Expert Comment

by:surbabu140977
ID: 39288448
Physical access will always be there for authorized people in the datacenter. Cannot prevent that. Even if you use a lock and key someone got to have the key. : )
0
 
LVL 7

Author Comment

by:Jaroslav Latal
ID: 39288477
yep, there is always some cyber enemy :)

I may have asked the wrong question.. I thought what can I do in OS against people who disconnected the cable and connect it to their notebook.
1, they do not know IP (I do not use DHCP, there is no default gateway either)
2, they do not know sharing password

Is man in the middle threat for me?
Should I use some encryption or certificate?


Regards,
Jarda
0
 
LVL 17

Accepted Solution

by:
surbabu140977 earned 1500 total points
ID: 39296672
port security with static mac address mapping in your switch. So even if they pull out the cable, their notebook won't connect.

Best,
0

Featured Post

WatchGuard's M Series Appliances - Miecom Approved

WatchGuard's newest M series appliances were put to the test by Miercom.  We had great results and outperformed all of our competitors in both stateless and stateful traffic throghput scenarios! Ready to see how your UTM appliance stacked up? Download the Miercom Report!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Suggested Courses
Course of the Month12 days, 11 hours left to enroll

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question