Security Basics mailing list archives

RE: how to save router config securely..


From: "Albers Darren" <Albers.Darren () wpstv com>
Date: Tue, 11 May 2004 13:37:25 -0400

I sent a reply to this earlier, but it got bounced back since my mailer tagged [SPAM] on it but you should look into 
Rancid or NeDi.

I manage 130+ routers with NMIS and NeDi.

-----Original Message-----
From: Murad Talukdar [mailto:talukdar_m () subway com]
Sent: Tuesday, May 11, 2004 2:59 AM
To: Tucker, Jason; security-basics () lists securityfocus com
Subject: Re: how to save router config securely..


Thanks for the great suggestions, will check them out and 
pick one that I'm
comfortable with.
Murad Talukdar


----- Original Message ----- 
From: "Tucker, Jason" <JTucker () libertymgt com>
To: "'Murad Talukdar'" <talukdar_m () subway com>;
<security-basics () lists securityfocus com>
Sent: Saturday, May 08, 2004 12:34 AM
Subject: RE: how to save router config securely..


Check out kiwicattools, they're both easy and cheap.

http://kiwisyslog.com/cattools2.htm


-----Original Message-----
From: Murad Talukdar [mailto:talukdar_m () subway com]
Sent: Wednesday, May 05, 2004 8:01 PM
To: security-basics () lists securityfocus com
Subject: how to save router config securely..


Basic question, where or how can I save my router config 
files and logs
securely? Something easy and preferably cheap!
Thanks guys.
Murad Talukdar





--------------------------------------------------------------
------------
-
Ethical Hacking at the InfoSec Institute. Mention this ad 
and get $545 off
any course! All of our class sizes are guaranteed to be 10 
students or
less
to facilitate one-on-one interaction with one of our expert 
instructors.
Attend a course taught by an expert instructor with years 
of in-the-field
pen testing experience in our state of the art hacking lab. 
Master the
skills
of an Ethical Hacker to better assess the security of your 
organization.
Visit us at:

http://www.infosecinstitute.com/courses/ethical_hacking_training.html

--------------------------------------------------------------
------------
--


This email message is for the sole use of the intended 
recipient(s) and
may
contain confidential and privileged information. Any 
unauthorized review,
use, disclosure or distribution is prohibited. If you are 
not the intended
recipient, please contact the sender by reply email and 
destroy all copies
of the original message.  Thank you.



--------------------------------------------------------------
------------
-
Ethical Hacking at the InfoSec Institute. Mention this ad 
and get $545 off
any course! All of our class sizes are guaranteed to be 10 
students or
less
to facilitate one-on-one interaction with one of our expert 
instructors.
Attend a course taught by an expert instructor with years 
of in-the-field
pen testing experience in our state of the art hacking lab. 
Master the
skills
of an Ethical Hacker to better assess the security of your 
organization.
Visit us at:

http://www.infosecinstitute.com/courses/ethical_hacking_training.html

--------------------------------------------------------------
------------
--






--------------------------------------------------------------
-------------
Ethical Hacking at the InfoSec Institute. Mention this ad and 
get $545 off 
any course! All of our class sizes are guaranteed to be 10 
students or less 
to facilitate one-on-one interaction with one of our expert 
instructors. 
Attend a course taught by an expert instructor with years of 
in-the-field 
pen testing experience in our state of the art hacking lab. 
Master the skills 
of an Ethical Hacker to better assess the security of your 
organization. 
Visit us at: 
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
--------------------------------------------------------------
--------------




**********************************************************************
The information and any files contained in this e-mail message are property of WestPoint Stevens Inc., its subsidiaries 
or affiliates, and are intended only for use of the individual or entity named above.  If the reader of this message is 
not the intended recipient, or the employee or agent responsible to deliver it to the intended recipient, you hereby 
are notified that use, dissemination, distribution or copying of this information is strictly prohibited.  If you have 
received this communication in error, please immediately notify us by return e-mail and destroy the original message.  
Thank you.
**********************************************************************


---------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off
any course! All of our class sizes are guaranteed to be 10 students or less
to facilitate one-on-one interaction with one of our expert instructors.
Attend a course taught by an expert instructor with years of in-the-field
pen testing experience in our state of the art hacking lab. Master the skills
of an Ethical Hacker to better assess the security of your organization.
Visit us at:
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
----------------------------------------------------------------------------


Current thread: