[nsp] router as term.server, security Q
Kinczli Zoltán
Zoltan.Kinczli at Synergon.hu
Thu Jan 29 09:59:19 EST 2004
Hello,
Given a router, acting as a terminal server on the protected network - behind a firewall
and given a router on the public network. The term.server router's tty line is connected to the
external router's console line/port.
On the console there is no possibilty of 'transport input X|none' command, and i seem to recall, that one
can not connect to the console remotely AND there is 'no exec' configured on the internal term.server's line.
Question is if any of you see any security risk on, and/or aware of any successful attack against to the
internal device (and towards the internal network)? I should also consider the case, when the external router
has already been 'compromised' by the attacker, so s/he has an enable prompt...
Any ideas are welcomed!
Thanks in advance
rgds
--zoltan
Ez az üzenet és a hozzá kapcsolódó fájlok, tervezetek kizárólag a
Címzettnek szólnak, a bennük foglalt információk bizalmasak, melyek
titokban maradásához a Synergon Informatika Rt.-nek jogilag méltányolható
érdeke fuzodik. Amennyiben valamely hiba folytán Ön nem a címzettje ennek a
levélnek, kérjük, semmisítse meg, és értesítse az üzenet küldojét. Az
üzenet az elküldés elott vírusellenorzésen esett át, de a vírusmentességére
nincs semmilyen garancia, ezért kérjük, ellenorizze azt!
DISCLAIMER
This e-mail and any attached files are confidential and may be legally
privileged. The content of this e-mail is subject of efforts by Synergon to
maintain its confidentiality. Also this e-mail is intended for the sole use
of the individual or entity to whom it is addressed. If you are not the
addressee, and received this transmission in error please delete this
e-mail and notify its sender immediately. This e-mail message has been
checked for computer viruses but it could still be infected. Please test it
for viruses before use.
More information about the cisco-nsp
mailing list