Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

The use of IPSEC with logging services

  • 05-07-2007 5:07pm
    #1
    Registered Users, Registered Users 2 Posts: 4,179 ✭✭✭


    Hi Guys,

    Everything I've read, and my own opinion, points to using encryption for all network logging traffic where possible. The easiest to implement seems to be IPSEC (from Network devices using Sysylog to Server event and other traffic). I've been playing with some policies on our servers to use IPSEC for MMC and Web Interface traffic for other management apps. I was going to expand this to all sensitive traffic like DNS etc. (we already use Active directory integrated and it's embedded encryption but IPSEC would be an improvement imho, plus we have one or 2 external domains with std. DNS transfers) and of course Syslog from the Cisco boxes. The problem is my boss doesn't think it's worth the effort. My point of view is that if it's not hard to implement and the data is sensitive that we should implement it regardless of the seemingly low risk - after all as the best quote I've heard yet sums up "Information Security is about throwing a lot of money and time at something so that nothing happens".
    How many of you implement similar systems, or have also decided that while best practice it wasn't worth it?


Advertisement