Got it

Security Isolation and Defense Mechanism Principals in S5700 Switches

Latest reply: Jun 17, 2021 15:55:54 570 45 17 0 0

Hi,


Today, I'll be sharing some guidelines on how we can ensure security isolation on S5700 switches. It is generally a neglected area but it needs a focus as it secures overall network and ensure security compliance.


Switches comply with the three-layer three-plane security isolation mechanism of X.805. Data flows at different importance levels face different security threats which have different impacts on users. To avoid mutual impacts between data flows, three security planes are planned on switches.

  • Management plane: This plane focuses on the security of application and service data for management users; that is, security of operation, maintenance, and management information.

  • Control plane: Switches have to run various protocols to implement services. The services must be protected against attacks or spoofing.

  • Forwarding plane: Switches use the destination MAC addresses and destination IP addresses of packets to search for routes for forwarding the packets. Security measures must be taken in the forwarding paths to prevent attacks on switches and spreading of attack traffic over the IP network.

By isolating the control, management, and forwarding planes, switches can ensure that attacks on any of the planes do not affect other planes.


X805



Security Hardening Principles


Security must be hardened continuously and can never be achieved once and forever. Any attempt to achieve permanent security using a single policy or through one-off security hardening configuration will fail.

Before carrying out security hardening, perform the following operations:

  • Fully understand service requirements: Security is always service-oriented. An appropriate security hardening policy can be developed only after the security protection requirements of the service system are clearly understood.

  • Evaluate risks comprehensively: Analyze security threats to the service system, identify weak points of the service system, balance the service system value against security hardening costs, and comprehensively evaluate security risks. Provide defense measures against unacceptable security risks. Treat acceptable risks as remaining risks, and periodically review them throughout the service system lifecycle to determine whether to reevaluate their risk levels.

  • Design a security hardening solution: Based on the comprehensive risk evaluation, design a solution that meets service requirements. Security is ensured by design, but not configuration. Every security hardening engineer should adequately understand this principle.

  • Implement security hardening policies: Before the implementation, evaluate the policy impact on services to prevent service loss.

After security hardening is complete, continuous monitoring and maintenance on the service system are required, which can help locate faults promptly, adjust security hardening policies, and ensure that the policies have taken effect as expected. To sum up, security hardening is a process requiring continuous improvement.


I hope you know the importance and basic principals to take care of in increasing security.

In case of any queries, please comment below.


Source: Hedex


great
View more
  • x
  • convention:

umaryaqub
umaryaqub Created Feb 9, 2021 05:57:05 (0) (0)
Thanks  
Faridrami
Faridrami Reply umaryaqub  Created Feb 9, 2021 16:14:51 (0) (0)
 
Thanks for sharing
View more
  • x
  • convention:

umaryaqub
umaryaqub Created Feb 9, 2021 05:57:19 (0) (0)
Thanks for your support  
Security Isolation and Defense Mechanism Principals in S5700 Switches-3776339-1
View more
  • x
  • convention:

Thanks for the information!
View more
  • x
  • convention:

umaryaqub
umaryaqub Created Feb 9, 2021 05:57:35 (0) (0)
Welcome and thanks for your support  
Thanks for sharing
View more
  • x
  • convention:

umaryaqub
umaryaqub Created Feb 10, 2021 06:28:06 (0) (0)
Thanks for your support  
Security Isolation and Defense Mechanism Principals in S5700 Switches-3776367-1
View more
  • x
  • convention:

Very useful guideline
View more
  • x
  • convention:

umaryaqub
umaryaqub Created Feb 9, 2021 05:57:43 (0) (0)
Thanks  
lan2019
lan2019 Created Feb 14, 2021 01:10:42 (0) (0)
Great  
Thank you for the information
View more
  • x
  • convention:

umaryaqub
umaryaqub Created Feb 11, 2021 06:10:45 (0) (0)
Thanks for your support  
Thanks for sharing
View more
  • x
  • convention:

umaryaqub
umaryaqub Created Feb 11, 2021 06:11:04 (0) (0)
Thanks for your support  
123
Back to list

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.