Secure in a Foundry

  • Written By: G. Duhaime
  • Published: June 9 2000

Secure in a Foundry
G. Duhaime - June 9, 2000

Event Summary

Foundry Networks, Inc. announced that it would be incorporating Secure Shell Technology into all high-performance switching devices free of charge.

According to Ken Cheng, Vice President of marketing for Foundry Networks, "The internet has become the mass communication medium and an economic way to communicate among remote sites. It is used increasingly to access networking devices for configuration and management purposes."

By having the SSH technology bundled in as part of the technology pyramid for these devices, one will be able to leverage the authentication and data encryption methods supported to securely manage edge or core devices remotely.

Market Impact

Foundry Networks inclusion of SSH Technology provides a great mechanism for Network Managers to remotely control their network over the Internet while maintaining network security. SSH Technology is supported and available today with all Foundry Products via IronWare and Internet IronWare software suite release 7.0.00.

The Secure Shell technology that Foundry Networks embedded into their devices is a feature rich instruction code that includes all forms of encryption ranging from DES (56 bit) to Triple DES (168-bit). Foundry Networks also includes nine levels of data compression.

With the combination of Foundry's IronWare 7.0 software suite and a built-in feature set that does data encryption and authentication on all Foundry Network Devices. Edge devices will now have an additional layer of protection against hackers. This by no means indicates that your edge devices will never be hacked, but now there is an additional layer of security that was not present before.

User Recommendations

Can Network Managers say telecommuting!! That's right! Foundry Networks has just made every Network Manager's dream come true.

TEC is glad to see that Foundry Networks is incorporating a very important feature into its networking devices by adding Secure Shell Technology into the Fabric of these devices as well as its proprietary software to communicate with its product line.

This additional layer of security is no good if network managers do not use best practices when creating user accounts and passwords. Passwords and logins that use the product name or passwords like "password" will not deter a rookie hacker, never mind a seasoned veteran. Network Managers must use common sense when creating this information and remember to change the passwords at predetermined time frames or when qualified personnel leave the company.

comments powered by Disqus