Cisco Cisco NSS030 Smart Storage External Power Adapter 白皮書

下载
页码 25
Security Considerations White Paper for Cisco Smart Storage 
25
White Paper
Figure 21 Security Level Configuration
Conclusion
“You can’t outrun the Bear” but there are ways to avoid being eaten. One is to be 
faster than the guy next to you. The other is to make it difficult and not worth the 
effort for the bear to chase you. In either case, you have to do something. It is 
difficult to render the system bullet-proof from hackers and attacks without 
effecting the system usability and accessibility. The key is to consider the trade-
offs very carefully between the convenience and utility of enabling WAN based 
access to the NAS, and various services (MySQL, Web Server, etc.) versus the 
security risks. If improperly assessed, the end result can lead to loss of sensitive 
information (confidential company information, marketing strategies, etc.), 
correspondence (emails, contacts), or financial details.
Cisco, Cisco Systems, the Cisco logo, and the Cisco Systems logo are registered trademarks or trademarks of Cisco and/or its affiliates in the 
United States and certain other countries. All other trademarks mentioned in this document or website are the property of their respective 
owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1002R)
© 2010 Cisco Systems, Inc. All rights reserved.
OL-23025-01