Secure in a Foundry
Written By: G. Duhaime
Published On: June 2000
Secure in a Foundry
Foundry Networks, Inc. announced that it would be incorporating Secure
Shell Technology into all high-performance switching devices free of charge.
to Ken Cheng, Vice President of marketing for Foundry Networks, "The internet
has become the mass communication medium and an economic way to communicate
among remote sites. It is used increasingly to access networking devices
for configuration and management purposes."
having the SSH technology bundled in as part of the technology pyramid
for these devices, one will be able to leverage the authentication and
data encryption methods supported to securely manage edge or core devices
Foundry Networks inclusion of SSH Technology provides a great mechanism
for Network Managers to remotely control their network over the Internet
while maintaining network security. SSH Technology is supported and available
today with all Foundry Products via IronWare and Internet IronWare software
suite release 7.0.00.
Secure Shell technology that Foundry Networks embedded into their devices
is a feature rich instruction code that includes all forms of encryption
ranging from DES (56 bit) to Triple DES (168-bit). Foundry Networks also
includes nine levels of data compression.
the combination of Foundry's IronWare 7.0 software suite and a built-in
feature set that does data encryption and authentication on all Foundry
Network Devices. Edge devices will now have an additional layer of protection
against hackers. This by no means indicates that your edge devices will
never be hacked, but now there is an additional layer of security that
was not present before.
Can Network Managers say telecommuting!! That's right! Foundry Networks
has just made every Network Manager's dream come true.
is glad to see that Foundry Networks is incorporating a very important
feature into its networking devices by adding Secure Shell Technology
into the Fabric of these devices as well as its proprietary software to
communicate with its product line.
additional layer of security is no good if network managers do not use
best practices when creating user accounts and passwords. Passwords and
logins that use the product name or passwords like "password" will not
deter a rookie hacker, never mind a seasoned veteran. Network Managers
must use common sense when creating this information and remember to change
the passwords at predetermined time frames or when qualified personnel
leave the company.