SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsA major risk of implementing network appliance load balancers can be the default or improperly configured network services on the device itself. Most load balancers have at least one interface in the same subnet as the Web servers for which they balance the load. If this interface, for example, is configured to run an SNMP server with a default or easily guessable read-write community string, and a hacker was to exploit the one vulnerable system mentioned above, chances are it would only be a matter of time until this hacker gains control of the load balancer as well. Thus, these appliances, alone, can be just as vulnerable as any other improperly configured system on a TCP/IP network. This paper documents specific implementation steps required to secure a well-known, widely implemented network appliance load balancer: The Cisco LocalDirector.