PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March 2004

Ensure secure routing protocols with access control best practices

Enterprises have hardened their perimeters with VPNs, firewalls and intrusion detection systems, but organizations need to focus more on securing routing protocols, the fundamental element of any corporate network, typically remain untouched. There are basic precautions everyone should take to control physical and logical access to routers. But these measures target the router itself, leaving the routing protocol communication unprotected, in part because security wasn't an explicit consideration when routing protocols evolved in the '80s and '90s. Many of the access control mechanisms inherent in routing protocols exist to avoid routing loops, not to deter malicious users from injecting false routing information. Nevertheless, by using combinations of route filtering and cryptographic authentication, you can defend your network against intruders bent on injecting invalid routing information to disrupt your network or view critical corporate data. In the March issue of Information Security magazine, we look at how vulnerable ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

Columns in this issue

  • The security improvements of Microsoft ISA Server 2004

    by  Victor R. Garza

    In an effort to bolster its security image, Microsoft is going to release its ISA Server 2004 later this year. Here you will learn about the security improvements of Microsoft ISA Server 2004.