Page 398 - StudyBook.pdf
P. 398

382    Chapter 6 • Infrastructure Security: Devices and Media

             Packet Exchange/Sequenced Packet Exchange (IPX/SPX) or Network Basic
             Input/Output System (NetBIOS).



              EXAM WARNING
                  Knowing that specific protocols can be filtered through a RAS is very
                  important. This feature allows you to implement an additional layer of
                  security by keeping unauthorized protocols from being used on your
                  network. The Security+ exam expects you to have knowledge of this
                  security feature and to understand how it can help protect your net-
                  work. Blocking unnecessary traffic of this type functions to both reduce
                  your network bandwidth utilization, and prevent potential security
                  breaches using the unnecessary protocols.




                 When securing a RAS server, it is critical to use the best authentication
             method possible for the environment. Implementing callback verification is also a
             good idea. For example, if remote users always call from home, then callback verifi-
             cation would work well and add another layer of security. However, if dealing with
             a mobile sales force calling in from anywhere, callback verification as a security
             mechanism is severely limited.
                 If an intruder detects dial-in numbers either through war dialing or some other
             means, they will try everything possible to access the network through the RAS
             server. Using strong password security for user accounts is critical to making it
             more difficult for intruders to access the network. It is also a good idea to use user
             IDs for the user’s RAS account that differ from their e-mail or standard LAN
             access IDs.This makes it more difficult for intruders to access an internal network
             should they manage to get through the RAS security, as they would still need to
             determine the user’s normal LAN ID and password to access any network
             resources.
                 Overall, RAS is an important service to provide when remote access is needed
             via dial-up; however, it presents several security vulnerabilities that must be
             addressed. Proper implementation of this service allows administrators to provide
             for the remote access needs of their users while keeping their network as secure as
             possible. Following is a list of industry best practices for keeping a RAS implemen-
             tation secure:







          www.syngress.com
   393   394   395   396   397   398   399   400   401   402   403