Cisco DNCS System Release 2.7 3.7 4.2 Guida Alla Progettazione
Contents
, Continued
vi
4000358 Rev B
Enable DOCSIS in the DBDS ..................................................................................... 2-14
Introduction ............................................................................................................. 2-14
Enabling DOCSIS in the DBDS ............................................................................. 2-14
DNCS .................................................................................................................... 2-14
CMTS .................................................................................................................... 2-14
DHCP Server ........................................................................................................ 2-14
TFTP Server .......................................................................................................... 2-15
Other Routers ....................................................................................................... 2-15
Chapter 3
Security Recommendations for the DBDS Network in a DOCSIS Environment
Overview ........................................................................................................................ 3-1
Introduction ............................................................................................................... 3-1
Disclaimer .................................................................................................................. 3-1
Audience .................................................................................................................... 3-1
In This Chapter .......................................................................................................... 3-2
Recommendations on IP Address Assignment ........................................................ 3-3
Introduction ............................................................................................................... 3-3
IP Addresses for Servers .......................................................................................... 3-3
IP Addresses for End-User Equipment .................................................................. 3-3
Security Recommendations ..................................................................................... 3-4
# 10 .......................................................................................................................... 3-4
# 20 .......................................................................................................................... 3-4
# 30 .......................................................................................................................... 3-4
Types of Security Attacks ............................................................................................ 3-5
Introduction ............................................................................................................... 3-5
Intrusion ..................................................................................................................... 3-5
Denial of Service ........................................................................................................ 3-5
Theft of Data From the DBDS .................................................................................. 3-5
Data Paths and Traffic Flows ...................................................................................... 3-6
Introduction ............................................................................................................... 3-6
High-Level View of Data Paths and Traffic Flows in the DBDS Network ....... 3-7
Secure Data Paths ...................................................................................................... 3-8