Three Plane Isolation Context Router products by default do not isolate the control, service, and management planes, owing to some reasons, such as historical inheritance and management. Users can log in to and manage routers through service interfaces. This poses the risk of a larger attack scope. Attackers easily exploit service interfaces to initiate attacks to the management plane. To prevent attacks to planes, it is recommended that configure isolation for the control, service, and management planes.
Three Plane Isolation Context Router products by default do not isolate the control, service, and management planes, owing to some reasons, such as historical inheritance and management. Users can log in to and manage routers through service interfaces. This poses the risk of a larger attack scope. Attackers easily exploit service interfaces to initiate attacks to the management plane. To prevent attacks to planes, it is recommended that configure isolation for the control, service, and management planes.
Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
Politically sensitive content
Content concerning pornography, gambling, and drug abuse
Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."