[nsp] router as term.server, security Q

Kinczli Zoltán Zoltan.Kinczli at Synergon.hu
Thu Jan 29 09:59:19 EST 2004


Hello,

  Given a router, acting as a terminal server on the protected network - behind a firewall
and given a router on the public network. The term.server router's tty line is connected to the
external router's console line/port.

  On the console there is no possibilty of 'transport input X|none' command, and i seem to recall, that one
can not connect to the console remotely  AND there is 'no exec' configured on the internal term.server's line.

  Question is if any of you see any security risk on, and/or aware of any successful attack against to the
internal device (and towards the internal network)? I should also consider the case, when the external router
has already been 'compromised' by the attacker, so s/he has an enable prompt...

  Any ideas are welcomed!

Thanks in advance

rgds
 --zoltan

Ez az üzenet és a hozzá kapcsolódó fájlok, tervezetek kizárólag a
Címzettnek szólnak, a bennük foglalt információk bizalmasak, melyek
titokban maradásához a Synergon Informatika Rt.-nek jogilag méltányolható
érdeke fuzodik. Amennyiben valamely hiba folytán Ön nem a címzettje ennek a
levélnek, kérjük, semmisítse meg, és értesítse az üzenet küldojét. Az
üzenet az elküldés elott vírusellenorzésen esett át, de a vírusmentességére
nincs semmilyen garancia, ezért kérjük, ellenorizze azt!

DISCLAIMER

This e-mail and any attached files are confidential and may be legally
privileged. The content of this e-mail is subject of efforts by Synergon to
maintain its confidentiality. Also this e-mail is intended for the sole use
of the individual or entity to whom it is addressed. If you are not the
addressee, and received this transmission in error please delete this
e-mail and notify its sender immediately. This e-mail message has been
checked for computer viruses but it could still be infected. Please test it
for viruses before use.





More information about the cisco-nsp mailing list