Even in networks with double-digit user numbers, the inventory of the active network devices and their tapping can take days for security gaps. It is often difficult to classify old network printers and other devices with embedded operating systems, some of which have not received software updates for years. Understandably, nobody wants to exchange a five-year-old network printer, which still functions perfectly. If, however, OpenVAS reports potential weaknesses, it is advisable to keep a closer look at the device and perhaps even cut its entire outgoing and incoming traffic. A UTM appliance at a central location may help, but it can often be exaggerated in small companies (up to 15 workstations) with regard to energy supplies and acquisition costs, especially if the gateway is not to work as a web proxy and mail gateway
In such environments, a better OpenWRT-enabled router with a USB interface can help to manage traffic properly and, if necessary, mitzne. One can not replace the best appliance: expertise. Anyone who wants to keep a network secure must be able to understand the basics of protocols and their tasks, to classify services, and to be able to assess vulnerabilities reported by OpenVAS or from packet dumps by reading CVEs.
No comments:
Post a Comment