home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.dcom.cell-relay
- Path: sparky!uunet!stanford.edu!kronos.arc.nasa.gov!iscnvx!news
- From: bantha.decnet.lockheed.com!young
- Subject: Security
- Message-ID: <1992Aug26.162040.8477@iscnvx.lmsc.lockheed.com>
- Reply-To: young@bantha.decnet.lockheed.com
- Sender: news@iscnvx.lmsc.lockheed.com (News)
- Organization: LMSC, Sunnyvale, California
- Date: Wed, 26 Aug 92 16:20:40 GMT
- Lines: 21
-
-
- Security in a Cell Relay Network?
-
- Speaking only for private networks, is security that much of a
- problem? Please explain why I should be concerned.
-
- Can't security filtering be done at the terminals of a cell relay
- network? At each terminal of the cell relay network, simply
- make sure that the VCI table entries are marked for illegal cell ID's.
-
- If my department has been allocated a block of VCI/VPI pair values
- for arbitrary use, the ATM network simply ignores any cells coming from
- my terminals that are not within my allocated block.
-
- Within my department, I have one or more logical cell relay networks
- constructed as I desire, (I am geographically distributed). Now I can
- choose whatever filtering method is available from the software vendors,
- including the use of TCP/IP, to provide filtering systems required by the
- applications I run.
-
- What is wrong with this picture?
-