Date: Fri, 29 Mar 2002 12:28:06 -0800 From: "Crist J. Clark" <cjc@FreeBSD.ORG> To: Dmitry Shupilov <root@ns.tb.by> Cc: security@FreeBSD.ORG, roam@ringlet.net Subject: Re: SSH or Telnet? Message-ID: <20020329122806.V97841@blossom.cjclark.org> In-Reply-To: <192258005672.20020329153842@ns.tb.by>; from root@ns.tb.by on Fri, Mar 29, 2002 at 03:38:42PM %2B0200 References: <20020328201100.E6672-100000@cactus.fi.uba.ar> <72250498197.20020329133335@ns.tb.by> <20020329143538.B340@straylight.oblivion.bg> <192258005672.20020329153842@ns.tb.by>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Mar 29, 2002 at 03:38:42PM +0200, Dmitry Shupilov wrote:
> Friday, March 29, 2002, 2:35:38 PM, you wrote:
>
> PP> Other than that, IPSec is a step towards a solution.
> If you don't like IPSec you can try VLAN's. VLAN's are what I use in
> my office to connect to critical hardware (routers, servers etc). But
> this solution is accomplished though the Cisco switches. The new Cisco
> switch support access lists per port (this is not Cisco advertisement:).
Please repeat after me...
1) Switching is not a security feature. Switching is not a security
feature. Switching...
2) VLANs are not a security feature. VLANs are not a security
feature. VLANs...
Both switching and VLANs were meant to increace _performance._
Switching never was and still is not a good security feature in any
managable sense on any hardware I've seen. Cisco has tried to tack
security onto VLAN implementations as an afterthought, but unless
things have changed recently, they were just that, not very well
implemented afterthoughts.
--
Crist J. Clark | cjclark@alum.mit.edu
| cjclark@jhu.edu
http://people.freebsd.org/~cjc/ | cjc@freebsd.org
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020329122806.V97841>
