Occasionally, all the network intrusion management software and appliances in the world aren't enough to prevent a breach of security on a customer's network. In the event of an intrusion, VARs and consultants need to be ready with the appropriate tools and strategies to recover the network and get everything up and running again.
How to recover your network after a security breach
If you have the time and money to invest in some of the more impressive network management systems, you can possibly recover your network by clicking a few buttons. If you're on a budget, with a typical medium sized network, here's a list of things you should do when you discover something amiss.
- Preserve the logs
- Notify the proper authorities
- Check your infrastructure for compromise
- Restore your configuration
About the author
Tom Lancaster, CCIE# 8829 CNX# 1105, is a consultant with 15 years of experience in the networking industry. He is co-author of several books on networking, most recently,CCSP: Secure PIX and Secure VPN Study Guide, published by Sybex.
This was first published in April 2007