Solved

securing direct network connection

Posted on 2013-06-30
3
289 Views
Last Modified: 2013-07-03
Dear experts,

I have 2 servers in data center connected directly to each other for backup data. Unfortunately there is physical access to it.

Scenario:
Server A (server 2008, two ethernets):
eth1: internet
eth2: direct connection to server B, network sharing enabled

Server B (server 2008 R2, two ethernets):
eth1: internet
eth2: direct connection to server A, network sharing enabled

There is daily backup (Windwos server backup) to each other.

What is the best practice to secure it?


Regards,
Jarda
0
Comment
Question by:Jaroslav Latal
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 17

Expert Comment

by:surbabu140977
ID: 39288448
Physical access will always be there for authorized people in the datacenter. Cannot prevent that. Even if you use a lock and key someone got to have the key. : )
0
 
LVL 7

Author Comment

by:Jaroslav Latal
ID: 39288477
yep, there is always some cyber enemy :)

I may have asked the wrong question.. I thought what can I do in OS against people who disconnected the cable and connect it to their notebook.
1, they do not know IP (I do not use DHCP, there is no default gateway either)
2, they do not know sharing password

Is man in the middle threat for me?
Should I use some encryption or certificate?


Regards,
Jarda
0
 
LVL 17

Accepted Solution

by:
surbabu140977 earned 500 total points
ID: 39296672
port security with static mac address mapping in your switch. So even if they pull out the cable, their notebook won't connect.

Best,
0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
An article on effective troubleshooting
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question