When protecting terminals, you are not protecting the physical hardware device. You are protecting the port through which the terminal is defined to your system. It does not matter which actual physical device is attached to that port. The name of the port that you protect is defined and can be changed by your network control area.
This can be the cause of administrative problems. If you choose to protect all, or a significant number, of terminals in your organization, you must have solid procedures between the network control area and the security administration area to ensure that the security administration area is notified of every planned change to the network. This gives the security administration area time to redefine the affected terminals to complement the network change so that appropriate security is in place when the network is reconfigured.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|