[152271] in North American Network Operators' Group
Re: Securing OOB
daemon@ATHENA.MIT.EDU (Leigh Porter)
Mon Apr 23 08:44:01 2012
From: Leigh Porter <leigh.porter@ukbroadband.com>
To: Eric <eric@roxanne.org>
Date: Mon, 23 Apr 2012 12:45:01 +0000
In-Reply-To: <A154B416-CCD4-4249-A871-E422E891C8D9@roxanne.org>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
I have juniper SRX110s that use the magic new multi site IPSec thing.=20
--=20
Leigh Porter
On 23 Apr 2012, at 13:43, "Eric" <eric@roxanne.org> wrote:
> Hello,
>=20
> It seems that the current practice is to use a DSL line, as opposed to a=
modem, for accessing an OOB a console server at a remote colo. From a se=
curity standpoint, what do people generally do - trust the console server,=
repurpose an old linksys box from my house or put in a full firewall? =20=
>=20
> Eric :)
>=20
>=20
>=20
> ______________________________________________________________________
> This email has been scanned by the Symantec Email Security.cloud service=
.
> For more information please visit http://www.symanteccloud.com
> ______________________________________________________________________
______________________________________________________________________
This email has been scanned by the Symantec Email Security.cloud service.
For more information please visit http://www.symanteccloud.com
______________________________________________________________________