What is the Border Router Security Tool (BRST) and how does work? Should it be considered for use in an enterprise...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
"Securing the Internet one router at a time."
That's the worthy goal of the Border Router Security Tool.
BRST provides a means for organizations to easily configure routers before deploying them, when upgrading and so on. This approach lends itself to more consistent standards and, presumably, better security.
Various options for configuring your router include:
- Enabling/disabling global and internal network segment services such as DHCP, HTTP, Finger and IP redirect;
- Identifying a trusted computer for remote access;
- Configuring a DMZ; and
- Enabling logging.
Here's a snippet of the Border Router Security Tool interface:
There's also a downloadable version of the Border Router Security Tool available on GitHub if you want to use it internally on your network.
I don't think there's anything wrong with using such a tool in your enterprise security strategy. If anything, it can increase productivity and ensure standardization across systems. I can't imagine any IT professional not being able to benefit from such an approach. As the tool suggests, just be careful entering in potentially sensitive configuration information and passwords that could end up being used against you at some point.
Ask the Expert:
Have a question about network security? Send it via email today. (All questions are anonymous.)
Learn more about using routers to boost network firewall security
Dig Deeper on Network device security: Appliances, firewalls and switches
Related Q&A from Kevin Beaver
The WannaCry TCP port 445 exploit returned the spotlight to Microsoft's long-abused networking port. Network security expert Kevin Beaver explains ...continue reading
Enterprise network security expert Kevin Beaver compares and contrasts the roles of an inbound firewall and an outbound firewall. Find out what the ...continue reading
Knowing how to test for security flaws is vital, but it's a complicated and changing field. Expert Kevin Beaver offers security testing basics.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.