when using TFTP?

How do you mitigate the threats presented when using TFTP?

How do you mitigate the threats presented when using TFTP?

A.
TFTP traffic use peer authentication for each session.

B.
TFTP traffic should be encrypted within an IPSec tunnel.

C.
IP packet inspection should be enabled on all routers.

D.
IP verify reverse path should be enabled on all routers.

Explanation:
Where possible, TFTP traffic should be encrypted within an IPSec tunnel in order to mitigate the chance of its being intercepted.
REF;Safe white papers;page 72
SAFE: Extending the Security Blueprint to Small, Midsize, and Remote-User Networks



Leave a Reply 0

Your email address will not be published. Required fields are marked *