Talk With an Expert

Securing the Cisco Local Director

Securing the Cisco Local Director (PDF, 2.27MB)Published: 18 Dec, 2001
Created by:
Scott Ambrose

A major risk of implementing network appliance load balancers can be the default or improperly configured network services on the device itself. Most load balancers have at least one interface in the same subnet as the Web servers for which they balance the load. If this interface, for example, is configured to run an SNMP server with a default or easily guessable read-write community string, and a hacker was to exploit the one vulnerable system mentioned above, chances are it would only be a matter of time until this hacker gains control of the load balancer as well. Thus, these appliances, alone, can be just as vulnerable as any other improperly configured system on a TCP/IP network. This paper documents specific implementation steps required to secure a well-known, widely implemented network appliance load balancer: The Cisco LocalDirector.