Secure remote management appliance

ABSTRACT

A computer network management system with an embedded processor, an analog communication means and a digital interface for network management provides a system for remotely and securely managing a network. Backup power in the form of an uninterrupted power supply, or other power means as appropriate, allows the modem to provide power outage notification to a remote site. The system further provides authentication and authorization capabilities for security purposes.

CROSS REFERENCE TO RELATED APPLIANCE

The present application claims priority from U.S. ProvisionalApplication Ser. No. 60/388,287 filed Jun. 13, 2002 and U.S. ProvisionalApplication Ser. No. 60/438,282 filed Jan. 6, 2003. The presentinvention is related to the invention described in co-owned, co-pendingpatent application Ser. No. 10/461,820 filed on Jun. 13, 2003,incorporated herein by reference.

TECHNICAL FIELD OF THE INVENTION

The present invention relates in general to methods and apparatus usedin managing devices or elements in a communication network and moreparticularly to methods and apparatus for remote management of thesedevices or elements in a secure manner.

BACKGROUND OF THE INVENTION

In computer networks with distributed networking elements such asrouters and switches, the vast majority of the networking elements arenot in the same geographic location or easily accessible by the skilledtechnicians or network administrators typically responsible for normalmaintenance of the elements. Not only do these technicians andadministrators require regular access to the network elements formaintenance, but they also need timely access to the network elementswhen problems arise in order to perform trouble shooting and resolvingproblems. The more quickly a network administrator can access theelements in the network for troubleshooting the shorter themean-time-to-repair (MTTR) an outage in the network.

In general, it is not practical to require physical access to thenetwork elements for general maintenance or troubleshooting and repair.The costs would be prohibitive, both in time and personal, to require askilled technician to be dispatched for every required activity on anelement. This has driven a strong requirement to provide for remotemanagement of network elements. A number of means have been developed toprovide for remote management of the network elements. Remote managementof the elements can be provided in-band (the remote administratorcommunicates with the network element using the network of which theelement is a part) or out-of-band (the remote administrator communicateswith the network element using a means other than the network of whichthe network element is a part). Typically, when out-of-band remotemanagement is utilized, the administrator is connecting to a console ormanagement port on the network elements.

However, the security of the network elements is a concern when remotemanagement is allowed. For a network element to be secure, it must firstof all be physically secure from attack. Without physical security, itis almost certain an attacker can compromise a network element. Ifmanagement of the element requires physical access to the element thenthe security of the management is as strong as the physical security.But, as stated above, in most networks this is not practical. It isimportant though, to realize that opening up a device to remotemanagement allows a larger window for attackers to utilize in an attack.The use and security of remote management must be carefully considered.

The struggle to find a workable compromise between the utility of remotemanagement of network elements and the need to maintain the security ofthe network elements can clearly be seen in “The Router SecurityConfiguration Guide” published by the National Security Agency. On page49 of the guide it is recommended that a terminal (or computer) be astand-alone device protected from unauthorized access. This goes back torequiring physical access to the network element in order to access theconsole or management port. On page 47 the guide also states,“Permitting direct dial-in to any vital piece of network infrastructureis potentially very risky . . . ”. In-band management methods oftendepend to one degree or another on the security of the network theelement is a part of to protect the management traffic. While this mightprovide a reasonable level of protection from external attacks(initiated from outside the network), it generally will not provide asufficient level of protection from an internal attack (initiated frominside a network). To help reduce the vulnerability to internal attack,the “The Router Security Configuration Guide” has recommendation using adedicated network or at least dedicated network segments for remotenetwork administration of routers. Building out a dedicated network formanagement would be quite expensive for most networks.

There are definite advantages to having an out-of-band remote managementconnection to network elements that utilize connectivity that is diversefrom the primary network connection. One of the primary purposes of theremote management connection is to assist the remote administrator ortechnician in troubleshooting network problems. With in-band management,if a network problem has hindered connectivity to a network element,management connectivity to that element could be lost when it is neededthe most. An out-of-band management solution is more likely to allow theadministrator or technician to still remotely access the network elementto troubleshoot and resolve the network problem in a timely manor. Also,the out-of-band management connection providing connectivity to theconsole or management port of an element might be available for theinitial configuration of the device whereas an in-band managementconnection might not be available for initial configuration. It is alsopossible that some functions can only be performed using the console ormanagement port of the element. An example of this would be PasswordRecovery on a Cisco router. While a dedicated and secure out-of-bandnetwork would be the most preferable solution for out-of-band managementfrom a security standpoint, the cost of such a solution is generallyprohibitive. While some form of public shared network, such as thePublic Switched Telephone Network (PSTN) or an Integrated ServicesDigital Network (ISDN) provides the most cost effective solution for adiverse out-of-band connection, the security of such solutions is amajor concern.

The most straightforward means of providing out-of-band connectivity toa network element is to place a modem on the console port of anetworking element connecting it to the PSTN. However, any perimetersecurity for the network such as firewalls and access-lists has justbeen completely bypassed providing a vulnerable point for intruders toattack. If an attacker knows or can determine the phone number of themodem then the only security is the logon protection on the networkingelement itself. War dialers will generally find phone numbers connectedto modems.

It is important to realize that most protocols used for assisting in theremote management of network elements do not provide for theconfidentiality or integrity of the information being transmittedbetween the remote administrator and the network element or strongauthentication of the parties involved. This is especially critical if apublic shared network such as the PSTN is utilized for the out-of-bandconnectivity. For instance, the protocol most frequently utilized forremote login to network elements (Telnet) transmits traffic in the clear(any one who can tap into or sniff the network can capture andunderstand the traffic). It would not be uncommon for a remoteadministrator to be transmitting passwords and device configurationsover such a connection. If an attacker were able to insert himself inthe middle of such a connection, even more attacks would be possible.

Maintenance and troubleshooting of network element problems can often befacilitated by the element having the element maintain an accurate timeclock. One way of keeping the clock accurate on an element is to allowthe network to set the clock utilizing a protocol such as Network TimeProtocol (NTP). If an attacker were able to alter or interfere with NTP,the smooth operation of the network could be interfered with.

Some network elements utilize Hypertext Transfer Protocol (HTTP) orHypertext Transfer Protocol over Secure Socket Layer (HTTPS) formanaging the network element. HTTP transmits information in the clearand is susceptible to impersonation and data compromise. Often HTTPS isonly authenticating the server to the client. For remote management,mutual authentication can be important.

A common difficulty in maintaining the elements of a network is keepingthe software on the elements updated with patches that protect them fromnew exploits by hackers and crackers. One of the functions of firewallsis to protect the elements behind them from the exploits so that it isnot as critical to keep protected elements updated. However, this doesrequire the firewalls to be updated regularly to protect the elementsfrom new exploits. Keeping the firewalls updated can be difficult.

An object of the invention is to utilize standard packet filteringfirewall methods to restrict access to the management interfaces basedon factors such as the source address of the connection request.

Another object of the invention is to use strong authentication toverify the identity of the user and restrict access based on theidentity of the user.

Another object of the invention is to use an Access Control Server (ACS)to allow for centralized authentication and authorization of users aswell as to log accounting information.

Another object of the invention is to restrict functions and protocolsallowed to access the management interfaces to those necessary forremote management of that network element.

Another object of the invention is to dynamically update the rules usedfor restricting access to the management interfaces.

Another object of the invention is to protect the console port fromprivilege hijacking.

Another object of the invention is to provide for the confidentialityand integrity of the information transmitted between the remoteadministrator and the management interfaces.

Another object of the invention is to monitor the management ports andthe network connections the SRMA utilizes for proper functioning andalert management software upon failure.

Another object of the invention is to monitor connections for possibleattacks and report possible attacks to Intrusion Detection Systemmanagement software.

Another object of the invention is to build a secure connection to anetwork providing network services both over an in-band connection andover an out-of-band connection.

Another object of the invention is to access network services such asACS, DNS, NTP, Network Management Stations, Logging Servers, andIntrusion Detection Systems management stations over either an in-bandnetwork connection or an out-of-band network connection (or both) anddynamically switch between which network is being utilized for theservice.

Another object of the invention is to allow a remote administrator ortechnician to access the management interfaces via either an in-bandconnection or an out-of-band connection (or both).

Yet another object of the invention is to provide auditing informationabout attempted connections (successful and unsuccessful) to themanagement interfaces.

Yet another object of the invention is to alert management software onunsuccessful attempt to connect to management interfaces.

Yet another object of the invention is to provide for protocolconversion between the connection from the remote administrator to theSRMA and from the SRMA to the network element over the managementinterface.

Yet another object of the invention is to protect the managementinterfaces from HTTP and HTTPS attacks and authenticate an HTTP/Sclient.

Yet another object of the invention is to be managed through the in-bandconnection, the out-of-band connection, or the SRMA console port.

A further object of the invention is to be managed using a command lineinterface or using HTTPS.

A further object of the invention is to be configured to automaticallycheck for updates to the SRMA software or protection database.

A further object of the invention is to provide the end-point for anin-band or out-of-band connection from the SRMA to the network providingnetwork services which connection can be secured using protocols such asIPSec or may be unsecured.

A further object of the invention is to provide the ability to switchthe path being utilized for network services, in particular, the SRMAwill be able to utilize an in-band connection for network services whenavailable and switch to using an out-of-band connection for networkservices when it is not available.

A further object of the invention is to provide a proxy firewall for acommand line interface (CLI) via an in-band connection or an out-of-bandconnection from the remote administrator to the SRMA. All connections tothe management interface of the managed device must go through the SRMA.This CLI proxy provides user authentication by whatever means areconfigured (possibly utilizing a centralized authentication server); theability to restrict certain commands from being executed; commandspoofing from the SRMA to the device being managed (as in spoofing alogoff command when the console connection is disconnected); a secureconnection from the remote administrator's network to the SRMA utilizingprotocols such as IPSec or SSH; and customized features based upon thedevice being managed.

Finally, it is an object of the present invention to accomplish theforegoing objectives in a simple and cost effective manner.

SUMMARY OF THE INVENTION

The present invention addresses the foregoing problems, as well as otherproblems, by providing an exemplary embodiment of a Secure RemoteManagement Appliance™ (SRMA). In this preferred exemplary embodiment,the SRMA is implemented as a stand-alone appliance; however, this is notintended to limit the implementation of these features to a stand-aloneappliance. These features also can be combined with other hardware andsoftware features such as being integrated with a modem or with theconsole of a device. Some of the features of the SRMA can also beimplemented separately. Such implementations would still be within thespirit and scope of this invention.

The primary purpose of the SRMA is to provide a firewall to protect thenetwork element interfaces used for remotely managing the element fromattack. In particular, the SRMA is intended to protect the console ormanagement port of a network element and to protect network segmentsdedicated to network management.

The SRMA allows the use of shared networks including public networkssuch as the Internet, the PSTN, or a corporate backbone network forsecure network management while still providing for the confidentialityand integrity of the management data. The SRMA increases both thesecurity and the availability of remote management of devices.

The initial release of the SRMA provides secure remote access fornetwork administrators to the console port of a device or virtualterminal access through a dedicated segment for management of a device.The SRMA allows for access selectivity at a user level and at a networkaddress level.

The SRMA can utilize network services to provide a centralized andscalable solution for secure remote management of the network. Some ofthe network services accessed can include an Access Control Server (ACS)to provide for centralized strong authentication and authorization atthe user level, a NTP server to provide time synchronization for theSRMA, a Domain Name Server (DNS) to provide name resolution for theSRMA, a logging server to provide for centralized logging, and a networkmanagement station to provide for centralized management of the SRMA andthe devices the SRMA is protecting, utilizing a protocol such as SimpleNetwork Management Protocol (SNMP). The SRMA can access the networkservices via a connection to the backbone network (or an operationssupport network) or via a tunnel through the out-of-band network to thebackbone network.

While many of the building blocks of the SRMA are in common use today,they have never been combined in such a way as to solve the problem ofsecuring remote management. Since there is a very strong need forsecuring remote management yet this has not been done, it is clearly notobvious to do this to one of ordinary skill in this area. This inventioncombines these building blocks along with additional new features tosolve the shortcomings in remote management.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates Dial-in Access to SRMA

FIG. 2 illustrates SRMA Connections

FIG. 3 illustrates a PSTN Out-of-Band Network

FIG. 4 illustrates Network Gateway to Out-of-Band Network

FIG. 5 illustrates ISP Access to SRMA

FIG. 6 illustrates Utilizing VPN Tunnel for SRMA Access to NetworkServices

FIG. 7 illustrates In-Band and Out-of-Band Access to NS

FIG. 8 illustrates the SRMA functioning as a proxy firewall

FIG. 9 is a block diagram of an SRMA filtering process

FIG. 10 is a block diagram of a new connection authentication process

FIG. 11 is a block diagram of a command verification process

FIG. 12 is a block diagram showing a network server connection process

FIG. 13 is a block diagram showing a network server reconnection process

FIG. 14 illustrates a typical setup of a modem connection to a networkdevice such as a router.

FIG. 15 illustrates typical password protection on a router usingTACACS+ and an ACS.

FIG. 16 illustrates typical password and challenge protection on aNetwork Access Server using RADIUS and an ACS.

FIG. 17 illustrates an SRMA connection both to a router console port, aPSTN, and a data network.

FIG. 18 illustrates a logical component breakdown of a preferredexemplary embodiment of the present invention.

FIG. 19 illustrates a logical component breakdown of an additionalpreferred exemplary embodiment of the present invention.

FIG. 20 illustrates a logical component breakdown of an additionalpreferred exemplary embodiment of the present invention.

FIG. 21 illustrates a logical component breakdown of an additionalpreferred exemplary embodiment of the present invention.

FIG. 22 shows sample flows used for an exemplary embodiment of IsolatedChallenge Mode Authentication.

FIG. 23 shows sample flows for an additional exemplary embodiment ofIsolated Challenge Mode Authentication.

FIG. 24 shows the SRMA in pass through mode.

FIG. 25 shows the SRMA in authenticated pass through mode.

FIG. 26 shows the SRMA acting as a logical bridge for the connectionfrom the remote user to the network device.

FIG. 27 shows the SRMA acting as an application gateway with a securenetwork level connection from the remote user to the SRMA.

FIG. 28 shows the SRMA acting as an application gateway with a secureapplication level connection from the remote user to the SRMA.

FIG. 29 illustrates using modem parameter negotiation to modify theoperating mode of the SRMA

FIG. 30 illustrates the SRMA connecting directly to a network managementstation over the PSTN to report network status information.

FIG. 31 illustrates the SRMA connecting over the PSTN to a NAS toestablish connectivity to a Network Management Station.

FIG. 32 illustrates a remote administrator connecting to a routerconsole port over the in-band network.

FIG. 33 illustrates a remote administrator connecting to a virtualterminal port on a router through the SRMA.

FIG. 34 illustrates a sample circuit for monitoring the voltage on atelephone line.

FIG. 35 illustrates the path of the call test setup (1) and the calltest (2) for call testing.

FIG. 36 illustrates the SRMA initiating a test of receiving a call.

FIG. 37 illustrates the SRMA initiating a test of placing a call.

FIG. 38.illustrates the Call Test Server initiating a test of the SRMAplacing a call.

FIG. 39 illustrates the Call Test Server initiating a test of the SRMAreceiving a call.

FIG. 40 illustrates the SRMA connectivity to an application to allowdynamic blocking of calls to the SRMA over the PSTN.

FIG. 41 shows a flowchart of the dial tone testing of a telephone line.

DETAILED DESCRIPTION

FIG. 1 illustrates the positioning of the SRMA device in a networkutilizing a PSTN as the out-of-band network.

As shown in FIG. 2, the SRMA has three categories of connections:

Management Connections are connections from the SRMA to the interfaceson the end device utilized for managing the device which can be aconsole connection and/or a connection to a dedicated management segment

Out-of-Band Connections are connections from the remote administrator tothe SRMA that are not a part of the network being managed

In-Band Connections are connections from the SRMA to the data networkbeing managed or the standard operations support network

Management Connections

Management Connections can take two forms, connections to the console ormanagement port of the device or connections to network segments thatare dedicated to device management.

Access to the console port of the network element is generally via anRS-232 serial interface. The SRMA can have multiple connections foraccessing device consoles.

Access to a dedicated network segment for network management can be anytype of network, but in today's environment the most likely types ofsegments would be Ethernet or Fast Ethernet segments. Ideally, thiswould be a back-to-back connection to the device being managed, but itcan also be an interface to a dedicated segment such as a virtual localarea network (VLAN) on a switch. In this case, multiple network elementscan be managed via the dedicated segment. The SRMA can also supportmultiple interfaces to dedicated management segments.

Out-of-Band Connections

The out-of-band connection type requirement would be determined by themodem or device used to access the secondary network. With an analogmodem this would generally be a serial RS-232 connection to the modem.With broadband modems, this would generally be an Ethernet interface.

In-Band Connections

The in-band connection is an interface from the SRMA to the networkbeing managed. Typically the SRMA will use this network to get tonetwork services like an ACS server, a DNS server, a logging server, anetwork management station, or an NTP server. An in-band connection fromthe SRMA to the in-band network provides a path to the network servicesthat should be “always up”. This interface can be of any supportedinterface type that can access the primary network. Most often thiswould be either a serial interface or an Ethernet interface (includingpossibly Fast Ethernet or even Gigabit Ethernet). Often this connectionwill be to an additional interface on the network element being managed.

There are a number of ways the SRMA can be utilized in a network forremote management of the network elements. Some of the sampleconfigurations include:

-   -   Secure Console Access via remote administrator dial over PSTN    -   Secure Console Access via Gateway or Network Access Server (NAS)        to Out-of-Band Network    -   Network Services provided via Out-of-Band Network        Secure Console Access via Remote Administrator Dial Over PSTN

In this scenario shown in FIG. 3, the remote administrator is usingtheir workstation to directly dial the PSTN phone number for the SRMA inorder to access a console connection to a network element services bythe SRMA. The SRMA would set up a point-to-point Internet Protocol (IP)connection to the remote administrator and the remote administratorwould run a secure client such as secure shell or an HTTPS client ontheir workstation for communicating with the SRMA. This would secure thecommunications between the remote administrator and the SRMA. The SRMAwould then proxy their terminal requests to the console connection orthe telnet connection on the dedicated management segment.

The SRMA can and should be configured to perform authentication andauthorization of the remote administrator before allowing access to themanagement connection for the network element. While the SRMA could beconfigured with a database of authorized administrators, it is alsopossible to utilize an ACS to authenticate and authorize a remoteadministrator. The SRMA utilizes its in-band connection to accessnetwork services such as an ACS in the network using a protocol such asRemote Authentication Dial-In User Service (RADIUS) protocol or TerminalAccess Controller Access Control System (TACACS+). This would allowcentralized authentication and authorization of the administrators. Inthis type of configuration, if connectivity to the network is down, theSRMA would have to revert to allowing access based on a locallymaintained database.

Secure Console Access via Gateway or NAS to Out-of-Band Network

FIG. 4 shows another configuration that can be used to allow remoteadministrators access to the SRMA (and then to the management connectionof the network element) is to utilize a NAS to dial out to the SRMA. Theadministrator accesses a port on the NAS utilizing a protocol such assecure shell causing the NAS to dial the SRMA over the PSTN. The SRMAthen uses this connection. It would also be possible to set up a NASsuch that HTTPS traffic to the specified port would cause the NAS todial the SRMA.

The out-of-band network does not have to be a PSTN network. Forinstance, in FIG. 5, if the SRMA is utilizing a Digital Subscriber Line(DSL) connection to an Internet service provider (ISP) and the DataNetwork has a gateway to the internet this diagram would work as well(though you would really want some sort of virtual private network (VPN)concentrator connected to the Internet allowing access only toconfigured SRMA clients).

Network Services Provided via Out-of-Band Network

One difficulty with using a centralized ACS is that, on occasion, anetwork administrator is attempting to access a network element duringproblem determination when the network connectivity is down. If everytime an administrator needed to access the management interface to anetwork element when the network access was down they needed to know alocally configured password on the SRMA, it would be very easy for toomany people to get to know that password for it to be secure.

Another alternative is for the SRMA to utilize the out-of-band networkconnection for connectivity to the ACS for authentication andauthorization as well as other network services. If the SRMA isutilizing a broadband connection such as DSL to access an ISP and thenis utilizing a VPN client to connect to a VPN gateway on the in-banddata network, not only can this VPN tunnel be used for remoteadministrator access to the SRMA, but the VPN tunnel can also be used bythe SRMA to access network services in the data network. The SRMA can beconfigured to always utilize the out-of-band connection for networkservices, or only to utilize it when the in-band connection to thenetwork service is down. The connection between the Data Network and theInternet would be able to utilize VPN services that exist today for VPNgateways.

In the configurations where a VPN tunnel is being built across theout-of-band network as shown in FIG. 6, the network administrator maydecide to allow the remote administers to use the telnet protocol toaccess the SRMA if they trust the security of the primary Data Network.The telnet traffic would travel in the clear between the remoteadminister and the gateway. The gateway would encapsulate the traffic inan Internet Protocol Security (IPSec) tunnel providing for dataconfidentiality and integrity as it travels across the “untrusted”out-of-band network. The SRMA would then receive the traffic from theIPSec tunnel and would proxy the connection to the console connection orthe management segment.

Even if the out-of-band network is a PSTN dial network, this connectioncan be utilized for the SRMA to access network services (see FIG. 7).This is more likely to be a case where the SRMA will generally utilize aconnection to the primary data network for access to network services,but if that connection is down the SRMA will utilize the out-of-bandconnection for access to the network services.

One feature of the SRMA, as shown in FIG. 8, is to function as a proxyfirewall for a device management command line interface (CLI). Theremote administrator would connect to the SRMA CLI proxy for the manageddevice (preferably using a secure protocol such as Secure Shell (SSH) orIPSec). The CLI proxy would then connect to the managed device usingdifferent protocols (such as a virtual terminal protocol or Telnet).

The SRMA can be configured to filter packets on various criteria such asorigin IP address or telephone number. For example, as shown in FIG. 9,if a packet is not from a valid source, log information will be recordedand the packet will be discarded. If the destination of the packet isfor a managed device, the packet will be forwarded to the CLI proxy. Ifthe destination is not for a managed device, the packet will be checkedto see if the destination is for a valid operating service on the SRMA.If so, it will be forwarded to that service. If not, it will be loggedand discarded.

When a request for a new connection to a managed device is received, theCLI proxy would use services from the SRMA to authenticate who the useris and obtain the list of commands they are authorized to execute, asshown in FIG. 10. The SRMA could be utilizing the services of acentralized Authentication Services to provide these services to the CLIproxy. The CLI proxy can be configured to only allow connections forauthenticated users that are authorized to connect to the service.Unauthorized connection requests will be discarded.

FIG. 11 shows one example of a process for authenticating a command.When a command from the remote administrator arrives at the proxy, theCLI proxy can compare the command to the list of commands allowed forthe remote administrator. The list could be of commands they are allowedto perform, or of commands they are not allowed to perform. If the useris not authorized to perform the command, the attempt will be logged andthe command discarded. If the user is authorized to perform the command,the command will be forwarded to the managed device.

The SRMA can make extensive use of network service in order tofacilitate the remote management of network devices. These services andinclude a centralized authentication server, a network time server(utilizing a protocol such as NTP), remote logging servers, and networkmanagement stations for reporting. The SRMA is set up to be able toaccess these network servers over multiple interfaces. Some of theseinterfaces will be in-band connections and some can be out-of-bandconnections. There are circumstances where it would be useful to utilizean in-band connection when available and only use the out-of-bandconnection when the in-band connection is not available. The SRMA can beconfigured to attempt to connect to network services according to apriority list starting at the top of the list, see FIG. 12.

In the event that an existing connection of a network service is lost,the SRMA can attempt to reestablish a connection to the network serviceover another interface, as shown in FIG. 13.

The SRMA may include an integrated modem consisting of an interface to atelephone line and a Data Circuit-terminating Equipment (DCE) interfacefor a connection to Data Terminal Equipment (DTE). In addition, the SRMAmay include one or more additional network interfaces as illustrated byFIGS. 17-21. One or more of the additional network interfaces could beused for reporting status information to a network management stationand for allowing for remote configuration of the SRMA. This networkconnection could also support a network protocol (such as TransmissionControl Protocol/Internet Protocol (TCP/IP)) and application protocols(such as SNMP, Telnet, HTTP, or Secure Shell) to facilitate this remotereporting and configuration as well as allowing network users access tothe SRMA. The connection to the primary in-band network could be aserial interface as depicted by FIG. 18 and FIG. 21, a local areanetwork (LAN) connection as depicted by FIG. 19 and FIG. 20 or any othertype of network connection. As depicted in FIG. 20, the SRMA can supportmultiple connections to the primary data network. Additional SRMAconnections could also be included for connections to additional DTEs asdepicted in FIG. 20.

The existence of a network connection to the primary data network alsoallows the SRMA to implement client protocols for centralizedAuthentication, Authorization, Accounting, and Auditing (AAAA) the sameas many other networked devices do. An example of such a protocol wouldbe RADIUS. This would allow the SRMA to do strong authentication andauthorization by connecting to a centralized server like Cisco's AccessControl Server and eliminate a security hole. FIG. 17 illustrates an ACSin the network for the SRMA to access.

In the event that the SRMA does not have a management connection or isunable to connect to the centralized server, as would be the case if theSRMA's connection to the primary data network were down, the SRMA canutilize the out-of-band connection for accessing the network services inmany cases. In the case when the SRMA cannot access network servicesover the out-of-band connection as well, but the user has networkconnectivity to an appropriate access control server and newauthentication protocol called Isolated Challenge Mode (ICM) can beutilized.

Another example of the usefulness of the isolated challenge mode ofoperation can be shown using Cisco routers. Today, Cisco routers allowyou to specify a sequence of authentication and authorization methodsand these methods are tried in order until a method is able to accept orreject an authentication or authorization. For instance, a router mayhave specified to first try TACACS+and then try local authentication(user name and password configured on the router). If the router haslost connectivity with the TACACS+ server for whatever reason thencentralized authentication and authorization (and auditing) is gone. Thesame would be true of authorizing the ENABLE privileged mode on therouter. If the connection to the TACACS+ server is down then the routermight be configured to accept an enable password configured on therouter. Often these passwords that are configured locally on the routersare configured the same on every router in order to administrate theprocess and these passwords can become well known. The isolatedchallenge mode could be the second choice of authentication if theconnection to the TACACS+ server is down. This would allow continued useof centralized authentication of the connecting user even when therouter is isolated (using the same database the TACACS+ server isusing).

The user can connect to the SRMA in several roles. They can connect tothe SRMA as a user desiring to connect to a serial port and will beauthenticated for the specific port they are trying to connect to, theycan connect as a network performance management operator gatheringperformance statistics for the SRMA, they can connect as a networkmanagement administrator, or they can connect as a network managementsecurity administrator for the SRMA. The Protection Profile for Switchesand Routers, incorporated herein by reference, available from theInformation Assurance Technical Framework (IATF) provides moreinformation about these rolls.

While the SRMA would be performing the isolated challenge authenticationand authorization in a terminal mode as described above, othersituations could make use of a frame or packet based isolated challengemode. Both terminal mode and packet mode isolated challengeauthentication will be discussed in more depth.

The secure mode of operation of the SRMA allows information that wouldotherwise be transmitted in clear text between the user and the routerto be encrypted by the SRMA and be protected between the SRMA and theuser. The information would only be in clear text between the routerconsole port and the SRMA and both these devices should be physicallysecured together. Since some of this information could be routerconfigurations and passwords, protecting this information is vital.

There are multiple methods for the SRMA to report status information tomonitoring stations or for the SRMA to allow for remote configuration ofthe SRMA. The existence of a network connection from the SRMA to a datanetwork allows the SRMA to regularly report on the status of the SRMAand its connections. This status information can be reported viastandardized means such as SNMP, or via private protocols, or acombination of both. Some status information can also be reported usingthe PSTN connection. This is especially important if status informationis to be communicated when the SRMA connection(s) to the data network(s)is (are) down. An example of this could be if the serial connection tothe console port of the router looses the Data Terminal Ready signalindicating the console port has either been unplugged or gone down. TheSRMA can be configured to dial a determined number and report thisoutage over the PSTN.

It is also possible to configure the SRMA to monitor the console portfor information that is logged to the console, filter the consolemessages, and dial out and send an alert over the PSTN for certain errorconditions such as a particular interface going down. If the interfacethat went down were the interface the router would normally have sentthe alert over then this might be the only way the alert gets sent.

The SRMA can also be configured to execute a macro before a call isconnected to a serial port or when a call is disconnected from a serialport. In the case of the serial port being connected to a Cisco consolea major advantage of this would be or automatically have the SRMA logout a user from the console as soon as a call becomes disconnected andnot allow any new called to connect to that port until the previous userhas been disconnected. This can be used to force each user to log inwith their own userid without any risk of them inheriting the previoususers privileges without logging in.

The connections from the SRMA to the data network(s) allow users toconnect to the SRMA and gain access to the DTE connections from the SRMAusing the primary data network as shown in FIG. 32 in addition to theconnection to the SRMA via the PSTN network. This can reduce longdistance charges and provide for a faster connection when the primarydata network connection(s) are up. In addition, the user has the optionof connecting to the SRMA in secure mode over the network, protectingthe information from the user to the SRMA and then connecting from theSRMA to the console port of the router over the serial interface. Asshown in FIG. 33 the SRMA could also be configured to allow the user toconnect to the SRMA in secure mode and then connect to the router over anetwork connection using Telnet. This would still protect theinformation from the user to the SRMA and only expose the information asclear text from the SRMA to the router. If the connection from the SRMAto the router were a physically secure back-to-back Ethernet connection,the exposure of the information would virtually be eliminated. Thiswould be useful where it is impractical to implement an IPSec connectionto the router for management or where the router software does not yetsupport IPSec or Secure shell.

The SRMA includes a means of automatically monitoring the status of theconnection to the telephone network. This monitoring can be accomplishedby measuring the voltage levels of the telephone line with a circuitsimilar to FIG. 34 and/or by periodically taking the line offshoot andchecking for dial tone as shown in the flow chart in FIG. 41. If theSRMA detects the connection to the telephone network is malfunctioningit will notify a monitoring station using the management connection overthe primary data network.

The SRMA can also use the network connection to communicate with a TestServer to coordinate periodic end-to-end tests of the PSTN connections.The Test Server can be configured to dial into the SRMA to verify SRMAin-bound call operation and the Test Server can request the SRMA to callthe Test Server to verify SRMA out-bound call operation. FIGS. 36-39depict this test coordination.

The SRMA can also monitor an external power source. If the SRMA detectsa power loss from its external power source, it will dial a configurednumber on the PSTN network and notify a monitoring system of the powerloss. This could requires a UPS for powering the SRMA while it isnotifying the monitoring platform of the power failure as depicted inFIGS. 18-20, or the SRMA could use telephone line powered circuitry forreporting the power failure as depicted in FIG. 21. The SRMA can also beconfigured to provide power-up notification when the SRMA is powered upfrom external power and completes initialization. The SRMA can providethe power-up notification using a data network connection if it isactive or the SRMA can dial a configured telephone number on the PSTNnetwork and provide the power-up notification. If the SRMA is connectedto the same power source as other equipment then the SRMA is effectivelymonitoring the power supply for the other equipment as well.

The SRMA can also provide a means of “cycling” the power for anotherdevice such as a router. Allowing an administrator to power cycle arouter and connect to the console port could save needing to send atechnician to a remote site for certain operations such as passwordrecovery. While logged into the SRMA the remote technician can cause therouter to be power cycled and then connect to the console port toperform password recover.

In order to defend against denial-of-service attacks on the PSTN linethe SRMA receives Caller ID on the calls it receives. If calls from thesame phone number consecutively fail authentication a certain number oftimes, calls from that number will be answered and immediatelydisconnected for a certain length of time. Notification of the attackcan be made over the management connection as well. If the SRMA does nothave a management connection or the management connection is down theSRMA can be configured to report the attack by dialing a configurednumber and reporting the attack over the PSTN.

Another method of protecting against a denial-of-service attack on thePSTN line is for the SRMA to be able to securely connect to anapplication that works with the PSTN local loop provider to manage callblocking. This is depicted in FIG. 40. This application would allow asubscriber to dynamically change a list of numbers to allow or blockcalls from as well as change if calls without the calling number beingavailable will be accepted. This application would allow PSTN numbersoriginating attacks to be blocked in the provider network leaving thelocal loop to the SRMA available for calls from authorized users.

The preferred exemplary embodiment of the SRMA of the present invention,as illustrated in FIGS. 18 through 20, comprises a management station toassist a remote network administrator in securely managing a networkingdevice such as a router or switch in an environment such as thatdepicted in FIG. 17. The SRMA provides the remote operator with a numberof capabilities that will be looked at individually. Having an embeddedprocessor in the SRMA facilitates these capabilities. The embeddedprocessor includes all the components necessary for stand-aloneoperation such random access memory (RAM), read-only memory (ROM),nonvolatile random access memory (NVRAM), and Flash memory. At timeswhen the embedded processor receives signals from the analog block itwill forward the signals to the serial port. At other times, asdiscussed below, the embedded processor will take other actionsconcerning signals received from the analog port.

The SRMA has one or more network ports for connection to a data network.This network connection could be a serial connection as depicted in FIG.18, a LAN connection as depicted in FIGS. 19 and 20, or any othersuitable network connection. The SRMA will run a suitable networkingprotocol such as IP over the network connection. This network connectionallows the SRMA to take advantage of many services available in thenetwork such as network management applications, Network Time ProtocolServers, Log Server, Access Control Servers, and providing remote accessto the SRMA over the data network using HTTP, Telnet, or Secure Shell aswell as others.

The SRMA has the capability to provide management information to anetwork management station. This could be implemented via standardizedprotocols such as SNMP or via proprietary protocols. The SRMA can beconfigured to allow a remote network management station to query theSRMA for information and/or for the SRMA to initiate sending informationto the network management station. The SRMA can be configured to sendselected information on a periodic basis as well as send selectedinformation when specified threshold conditions are met or errorconditions occur. This is referred to as setting traps for informationto be sent. Some management protocols also allow operating parameters ofthe SRMA to be changed by the remote administrator using the protocoland the data network.

Using the data network connection the SRMA can have access to an NTPServer and a log server. The NTP server allows the SRMA to maintain anaccurate time source and to use the time source for time stamping loginformation. The SRMA could also log events both locally and remotely ata log server over the network. Keeping proper log and audit informationis a vital part of network management.

The in-band network connection also allows the remote networkadministrator to access the SRMA for monitoring and configurationmanagement using the data network as well as through the analog line.The remote administrator could use Telnet, Secure Shell, or some otherappropriate remote terminal protocol to access the SRMA. They would thenbe able to display information about the operation of the SRMA or changethe configuration of the SRMA. This could save on toll charges forconnecting to the SRMA. The SRMA can also be set up to allow the remoteadministrator to use HTTP, or HTTPS and their web browser to access theSRMA.

The in-band network connection on the SRMA would also allow a remoteadministrator to access a console port connected to the serial port ofthe SRMA over the data network. The remote administrator connects to theSRMA over the data network using a remote terminal program such asTelnet or Secure Shell or using HTTPS and then would establish aconnection through the SRMA to the console port. This could save on tollcharges for connecting to the console ports or remote devices.

An additional service the SRMA can utilize through the in-bandconnection is an Access Control Server (ACS). The SRMA will run a clientfor authentication and can communicate with one or more ACS usingstandardized protocols such as RADIUS or proprietary protocols. Thiswould allow the SRMA to authenticate and authorize users connecting tothe SRMA and determine their privileges on the SRMA and what ports theyare authorized to connect to. If a protocol such as TACACS+ is beingused the SRMA would also be able to provide accounting information to anACS.

The advantages of using an ACS connected over the network is the userinformation, passwords and privileges can be configured on one centralsystem rather than having to be configured in every device in thenetwork. For larger networks with a large number of administratorscentralized authentication is mandatory. The SRMA would be able toperform authentication and authorization as depicted in FIGS. 15 and 16using the connection to an ACS over the data network.

However, there are times when the SRMA may not be able to connect to anACS. This could be cause by a portion of the path in the data networkbetween the SRMA and the ACS being down causing the SRMA to not be ableto use an ACS to authenticate or authorize users attempting to connectto the SRMA. The SRMA is not unique in experiencing this problem. Anydevice that uses an ACS for centralized authentication control sharesit. The device must either not allow any users to connect, allow allusers to connect, or perform authentication by some other means. A Ciscorouter, for instance, will have a list of methods for authentication. Ifthe first method on the list is not available for authentication, thenthe second method is attempted. That method might be a local database onthe device, which is not practical in a large network, or a commonpassword everybody who ever needed to know it (and then some) knows.

The SRMA implements a new authentication and authorization method calledICM that can be used when the SRMA does not have connectivity to an ACS,though the SRMA can be configured to use ICM for authentication evenwhen it does have connectivity to an ACS. In a large organization itwould not be unreasonable to expect the remote administrator to haveaccess to the data network and hence to an ACS. Therefore, an ACS canstill be used to authenticate and authorize the user to the SRMA usingthe centralized database. Any device can use ICM when a user isattempting to connect to the device and it is reasonable to expect theuser to have connectivity to an ACS.

In a preferred exemplary embodiment of ICM using public/private keypairs the SRMA or server for the connection holds a private key KSunique to itself and never reveals that key. Authentication servers onthe network hold the public key Ks of the pair and they are free todistribute that key to others. The ACS servers on the network also holda private key KACS from another public/private key pair forauthentication and the SRMA or server holds the public key Kacs of thepair. It is preferred that each ACS has its own private key forauthentication though it would also be possible for all the ACSs toshare one private key for authentication. Another implementation wouldhave the ACS hold a unique private key for each SRMA or server they areproviding authentication for. The ACS also has access to the userinformation and their resource authorization information.

As depicted in FIG. 22, when a remote administrator or user attempts toconnect to the SRMA, or any device implementing ICM authentication, theSRMA will issue a challenge typically in the form of a random number N.The subscript s is added to indicate this is a random number generatedby the SRMA which is the server in this connection attempt. Ns is sentto the remote administrator or user attempting to connect to the SRMA.The remote administrator has connectivity to an ACS and has eitheralready authenticated them self to the ACS or needs to do so at thistime. How the remote administrator authenticates them self to the ACS isdetermined by the security policy for the network and can vary dependingon the needs of the network and the security requirements for theinformation or device being accessed. The remote administrator will sendto the ACS what SRMA or server they are trying to access, the initialmode they want to enter on authentication, and Ns sent to them by theSRMA. The ACS already has the information about the remoteadministrator.

The ACS will prepare a message to be sent to the SRMA via the remoteadministrator. This message will include the usemame of theadministrator being authenticated, their authorization information,their initial mode to enter on authorization (can be defaulted),optionally the name of the ACS doing the authentication, and the hashalgorithm the ACS is going to use. This information should be encryptedusing the public key of the SRMA Ks in order to protect theconfidentiality of the information being sent though it does not need tobe encrypted for the integrity of the authentication process. The ACSwill then generate a hash from the prepared message using the hashalgorithm identified in the prepared message providing integrity for theinformation being sent and will encrypt the hash with its private keyKACS. This will allow the SRMA to verify that the message has not beentampered with. The ACS will then send the message encrypted with Ks andthe hash encrypted with KACS to the remote administrator. Optionally,the ACS can also send the remote administrator the SRMA's public key inorder to allow the remote administrator to authenticate the SRMA.

The remote administrator will then send the message encrypted with Ksand the hash encrypted with KACS to the SRMA in response to thechallenge Ns. If the remote administrator wants to authenticate the SRMAthe remote administrator will also generate a challenge of its own Nuand include it in the message sent to the SRMA

The SRMA can now use KS to decrypt the message encrypted with Ks andwill know the username attempting to connect, their authorization, theirinitial mode of operation, the name of the ACS providing authentication,and the hash algorithm the ACS used. The ACS hashes this informationalong with the original challenge Ns. It also uses Kacs to decrypt thehash encrypted with KACS and compares the two hashes. If the two hashesare the same the SRMA knows the message is authentic and can act on it.If the remote administrator included a challenge Nu, the SRMA willencrypt the challenge with its private key KS and sent the result to theremote administrator. The SRMA will encrypt the challenge Nu with itsprivate key Ks and return the result to the remote administrator. Theremote administrator will then be able to use the public key sent to itby the ACS to decrypt the results returned by the SRMA to authenticatethe SRMA. Because the ACS is trusted, the remote administrator onlyneeds the public key itself and not the trust chain. Mutualauthentication has taken place without any usernames or passwords beingtransmitted in the clear.

A preferred exemplary embodiment of ICM can also include a provision forfacilitating easier authentication for a user using cut and paste totransfer challenges and responses on their workstation. In this case itis important to limit the length of information transferred by theremote administrator. FIG. 23 illustrates a method for doing this. Whenthe remote administrator attempts to connect to the SRMA the SRMA stillresponds with challenge Ns and the remote administrator still needs tobe authenticated by the ACS by whatever means the security policy forthe network requires. The remote administrator then communicates that itwants to authenticate using the ICM short form of authentication andprovides the name of the SRMA, the mode/port it wants to beauthenticated for, and the challenge Ns it received from the SRMA.

The ACS server hashes the username, mode/port, and Ns using a selectedhash algorithm. The ACS then encrypts the hash using private key KACSand sends the encrypted hash, the name of the hash algorithm, and a newchallenge for the SRMA Nacs (if mutual authentication is required) tothe remote administrator. The remote administrator can then cut andpaste the message into their terminal emulator to send to the SRMA.

The SRMA will then prompt the remote administrator for their usemame,and the mode/port the want access to. After the remote administrator hasprovide this information the SRMA will hash the usemame, mode/port, andNs using the hash algorithm specified in the message from the ACS viathe remote administrator. The SRMA also decrypts the hash sent by theACS using Kacs and compares the two hashes. If the hashes match theinformation provided is authenticated.

If Nacs was provided then the ACS wants to authenticate the SRMA. TheSRMA will use the hash algorithm used by the ACS to hash the server nameand Nacs and will encrypt the hash with the SRMA private key KS and sendthe result to the remote administrator. The remote administrator willsend the encrypted hash to the ACS. The ACS will decrypt the hash withkey Ks and compare the hash to its own hash of server name and Nacs. Ifthey match the ACS sends a message to the remote administrator that theSRMA is authenticated.

As indicated above, the ICM authentication and authorization can be usedin environments other than a remote administrator connecting to an SRMA.Anytime a user or device that has access to an ACS is attempting toconnect to another device ICM can be used. If the device being connecteddoes not have connectivity to an ACS then ICM will allow the device touse a centralized database to authenticate the connecting device (and toauthenticate the device being connected to).

An example of when this might be useful would include a Cisco routerthat is configured to use TACACS+ as its first choice forauthentication. A typical second choice when TACACS+ is not availablemight be to use the enable or secret password. However, in a largeorganization, the enable password might not be very secure. With ICM,the second choice could be ICM using the same centralized user databasethat TACACS+ uses for authentication.

Another example of when ICM could be useful would be for backup links inan outage situation. If there are a number of ISDN links from acustomers central hub to remote sites and the primary connectivity isfor instance frame relay and the central hubs frame relay access circuitgoes down. The central hub might not have enough ISDN circuits torestore all the connections to remote sites and the central hub willwant to make a decision on which remote sites to bring up ISDN backuplinks to. The central hub will be initiating connections to remote sitesthat are quite possibly isolated from an ACS. ICM would allow the remoteisolated device to authenticate that the central hub is indeed thecentral hub.

When using cryptography, key distribution is always a consideration. AnSRMA will need to be configured with its private key KS. It will alsoneed to be configured with the public keys Kacs of any ACS private keythat can be used for authentication and authorization of users. If a newACS is added with a new private key KACS or an old key is compromised ornot longer valid, the list of public keys on the SRMA needs to beupdated. Also, if the SRMA private key becomes compromised it will needto be changed. In this preferred exemplary embodiment the privilege ofchanging and maintaining the public and private keys is reserved for theNetwork Security Administrator role. The SRMA can be configured to notallow the ACS servers to authenticate the Network Security Administratorrole, but rather to maintain a separate public key Kns forauthenticating a Network Security Administrator. This way the compromiseof an ACS private key will not allow an intruder to change the keys onan SRMA. Only a Network Security Administrator can do that. If, however,the Network Security Administrator private key becomes compromised andan intruder changes the keys on an SRMA before the compromised keys canbe changed, physical access to the SRMA will be required to restore theSRMA.

After a user is authenticated, they can be authorized for specificresources on the SRMA. These resources can include the different portsof the SRMA, the different roles of a user on the SRMA such as SRMAoperator, SRMA Network Administrator, or SRMA Network SecurityAdministrator, or for different functions of the SRMA such as powercycling a device. Each user can be authorized or not for the individualports, roles, or functions.

After a user is authenticated to the SRMA the SRMA will go into aninitial mode of operation. Some of the modes of operation would includeconnecting the user to a port in a pass through mode of operation wherethe data link connection is between the authenticated user and thedevice on the other end of the port, connecting the user to a port in asecure mode where the SRMA terminates the Data Link Control (DLC) fromthe user on the SRMA and performs encryption between the user and theSRMA and then passes the data to the port unencrypted, or one of theadministrative modes on the SRMA itself such as Network Operator,Network Administrator, or Network Security Operator.

The SRMA will operate in a different role for the different modes ofoperation. The different roles the SRMA can function in are illustratedin FIGS. 24 through 27.

FIG. 24 illustrates the SRMA operating in pass through mode. In thismode of operation, the SRMA is operating at the physical layer. Thesignals from/to the PSTN network are demodulated/modulated and the DLClayer connection is established between the remote user and the networkdevice. The SRMA can be configured to automatically be in this mode andnot even challenge the remote user. In this case the SRMA would befunctioning as a traditional modem. The SRMA could also be configured toenter this state after the user has been authenticated.

FIG. 25 illustrates the SRMA operating in verified pass through mode. Inthis mode the remote user establishes an initial connection to the SRMAitself. The SRMA authenticates the remote user and optionallyauthenticates itself to the remote user. Once authentication is completethe SRMA no longer participates in DLC level functions and reverts backto being a link level device.

There are times when it is advantageous to have the SRMA continue toterminate the DLC to the remote user and act as a bridge to the networkdevice. This is illustrated in FIG. 26. For instance, if the SRMA isbeing used to manage multiple devices and the remote user is to be ableto jump between the devices using control characters to exit aconnection to a device, the SRMA would act as a bridge at the DLS level.

If the traffic between the remote user and the network device were goingto be encapsulated in a layer 3 protocol such as IP then the SRMA wouldfunction as a router. However, in a preferred exemplary embodiment aprotocol such as IPSec would be encrypting the user traffic between theremote user and the SRMA at layer 3 and an application such as Telnetwould be running between the remote user and the SRMA over the IPSectunnel. The SRMA would then be acting as an application level gateway todeliver the user traffic to/from the network device in clear text usingan application such as a terminal emulator. This is illustrated in FIG.27.

FIG. 28 illustrates another application level gateway embodiment. Inthis embodiment, a TCP/IP connection is established between the remoteuser and the SRMA and then an application such as SSH is run between theuser and the SRMA. In this embodiment the encryption of the user trafficbetween the remote user and the SRMA is performed by the secure shellapplication. The SRMA would deliver the traffic in clear text to/fromthe network device using an application such as a terminal server.

When the SRMA is configured to operate in pass through mode without userauthentication, the user dialing in over the PSTN connection is notgiven the opportunity to elect to connect to the SRMA for administrativepurposes rather than connecting to the network device port. In general,this would not be a problem because the network administrator could usethe in-band connection of the SRMA to connect to the SRMA foradministration of the SRMA. However, if the in-band connection weredown, not connected, or not implemented on the SRMA this would not be anoption. In order to allow the SRMA to remotely be changed from passthrough mode to an administrative mode one of the modem negotiationsettings is reserved for a limited administrative mode. For instance, ifthe modem type negotiated to a 1200-baud Bell type 202 modem, then theSRMA would enter the limited administration mode. The main feature ofthe limited administration mode is that it allows a remote user to setthe SRMA out of pass through mode so that then can then enter anauthentication mode.

To recover the SRMA from pass through mode over the PSTN line the remoteuser would configure their modem to use the configured modem typereserved for Limited Admin operation. This would cause the modems tonegotiate to this setting. The SRMA would come up in Limited Admin modeand would request the remote user to enter a password. This passwordwill travel over the PSTN in the clear so should be changed afterLimited Admin Mode has been used. The remote user will enter thepassword and will then have access to the Limited Admin command set. Thecommand set will include the command to set the SRMA to authenticationmod (SET AUTHENTICATE). Other command may also be included in theLimited Admin command set.

Once the SET AUTHENTICATE command has been executed, the SRMA will beginnormal authentication. The remote user can continue to establish asession over this connection or they can hang up and call back toestablish a new connection with renegotiated modem settings. The SRMAremains in authentication mode until it is explicitly reconfigured forpass through mode.

In general, forcing the modem parameter negotiations to pre-selectedvalues can be used to select different modes of operation. The aboveexample was when the SRMA was set to pass through mode and the modemnegotiation was used to force the SRMA to a limited administrationstate. The same method could be used if the SRMA was configured toautomatically connect to an application on the SRMA such as a webapplication. The modem parameter negotiations could be used to changethe connection to a terminal emulation session or again to a limitedadministration mode.

In general, the SRMA will typically report ongoing network statusinformation and alerts to a network management station using a protocolsuch as SNMP by the in-band network connection. However, there are timeswhen the SRMA will report network status information and alerts over theout-of-band connection such as the PSTN. Typically, this would occurwhen the SRMA has lost connectivity to the Network Management Stationvia the in-band connection. One primary condition the SRMA might want toreport in this manner would be the failure of the SRMA in-bandconnection. Another event might be the loss of power to the site sincethe in-band connection could well be down due to the loss of power. Tosend the alert via the out-of-band connection, the SRMA would initiate aconnection over the out-of-band network to either the Network ManagementStation or to a Network Access Server (NAS) for the in-band network.Once this connection is established, the SRMA can send the alerts orstatus information to the Network Management Station over theout-of-band connection.

As indicated above, one of the events that it might make sense to reportover the out-of-band connection would be the loss of power at the site.The SRMA can be configured to report the loss of its main external powersupply. Upon detecting loss of power from the main power supply, theSRMA would be configured to dial a specific Network Management Stationto report the outage. This could be the same or a different NetworkManagement Station the SRMA uses for reporting other information. Thiswould provide a Network Management Center quick notification that theunderlying cause of a network problem is a power outage at the remotelocation. This can save significant time during the problemdetermination process and help get the proper personal involved morequickly.

The most straightforward way to provide the SRMA with power forreporting the power outage would be to build a small uninterrupted powersupply (UPS) into the SRMA. This UPS would provide the SRMA with limitedtime to establish a connection to the Network Management Station overthe out-of-band connection, report the outage, and possibly report anylog information stored on the SRMA before taking down the connection.The SRMA would then be available for connections from RemoteAdministrators via the out-of-band connection for further problemdetermination as long as the power in the UPS lasted.

Another exemplary embodiment for providing power for reporting the poweroutage at the site is to use line-powered equipment. There are a numberof line-powered modems on the market today. A relay held open by thepower from the main external power supply would close when the powerfails, connecting the line-powered equipment to the telephone line andthe power supply associated with the telephone line. The line-poweredcircuitry would be configured to establish a connection with a NetworkManagement Station and report the power loss. Using a line-powered modemwould eliminate the need for a UPS and would not limit the length oftime a connection could be established to the Network Management Stationor a Remote Administrator. However, the functionality of theline-powered equipment might be limited and there would be the expenseof the line-powered circuitry instead of the cost of the UPS.

The SRMA can also be configured to provide notification to the NetworkManagement Station when power is restored to the site. When power isrestored, the SRMA can be configured to wait a determined length of time(perhaps on the order of minutes) to give the network device time toboot and the in-band connection time to reestablish. At the end of thattime the SRMA will check the in-band connection. If the in-bandconnection is up and the SRMA has connectivity to the Network ManagementStation via the in-band connection, the SRMA will send the notificationof power restoration to the Network Management Station via the in-bandconnection. If the in-band connection is not up or the SRMA cannot reachthe Network Management Station via the in-band connection, then the SRMAwill establish a connection over the out-of-band connection to reportthe power restoration.

The SRMA can be configured to monitor the connection to the networkdevice console port. Monitoring the electrical characteristics of theconnection can allow for the detection of a cable being disconnected.Even with the use of a modem eliminator such as is commonly used whenthe connection to the console port of a network device than may beconfigured as a DCE and the port on the SRMA is also configured to be aDCE, the electrical characteristics of certain pins can be monitored toassure the network device is connected. For instance, if a 9 pin D-shellconnection is used for an RS-232 connection, the DTR signal (pin 4)could be monitored for voltage. Even with a modem eliminator, the remotedevice should be applying to the DTR signal pin of the SRMA. If novoltage is being applied to this pin, the SRMA can be configured to sendan alert.

The SRMA can be configured to monitor the traffic to and from theconsole of the attached network device since it is always connected tothe port. This allows for ongoing monitoring and/or logging of eventsinvolving the console. Commands a remote user sends to the console canbe logged and the response to those commands can be logged. In additionto monitoring commands from a remote administrator to a console and theresults returned, the SRMA can monitor messages sent to the consolewhile no remote administrator is logged on.

The SRMA can filter the messages sent to the console and generate analert or trap when certain messages are returned. For instance if theSRMA detects messages associated with the boot process of a device, theSRMA can generate an alert that the device just reloaded. If the SRMAsees a console message indicating a particular interface has gone downon a device, the SRMA can generate an alert. This could be useful if theinterface that went down was the interface the device would normally useto send network management traffic over.

Based on the authorization level afforded to the remote administrator,the SRMA could also filter what commands the remote administrator isallowed to issue to the network device. For instance, someadministrators might be precluded from entering the ENABLE mode on aCisco router. Having this ability to filter commands could be useful ifthe authentication and authorization methods on the SRMA are strongerthan the authentication and authorization methods on the device.

Another advantage of the SRMA is that an SRMA administrator can set upmacro commands on the SRMA. The administrator can also configure theSRMA to execute some commands at the beginning of a connection of aremote administrator to a network device console port and/or at the endof a connection to a network device console port. This can be used toplug a major hole in the security of allowing remote connectivity to theconsole port of a Cisco router or switch. Since the console port of thedevice can not tell when a connection drops, if a connection does dropand a new user connects in, the new user will have the authority andprivileges of the prior user without having logged in. However, the SRMAdoes know when the connection dropped and can execute a macro to log theuser out before another user can connect in. General macros that aremote administrate could execute could also be configured.

A remote administrator can also use the in-band data network to connectto the console port of a network device attached to an SRMA. By using anetwork based application such as Telnet, or SSH, or HTTP, the remoteadministrator can connect to the SRMA and the SRMA can then connect themto the console port of the router. By using a secure application such asSSH or HTTPS or by using secure paths through the network such as IPSectunnels, the communications between the remote administrator and theSRMA can be secure. Then the only place the traffic would pass in theclear would be between the SRMA and the console. Since the SRMA and thenetwork device should be collocated, the portion of the traffic paththat was the most vulnerable has just been secured. Allowing in-bandconnections like this can save on toll calls, and can also allow aremote administrator connect at higher speeds and they can haveconnections to multiple systems without having multiple modems.

It is also possible for a remote administrator to connect to the SRMAthrough the in-band data network and then through the SRMA connect tothe network device again through the SRMA in-band connection to the datanetwork to a virtual terminal (VTY) port on the network device. Theconnection from the remote administrator to the SRMA can be secure andthen a protocol such as Telnet can be used to connect from the SRMA tothe network device. This allows for the majority of the network path tobe secure. The only portion of the traffic path that would be insecureshould be a LAN segment between the SRMA and the network device. If theSRMA in-band connection were a back-to-back cable to a port on thenetwork device, then the only portion of the traffic path that would beinsecure would be the cable. This allows for more secure connections tothe VTY ports on a network device. Since many network devices do notsupport secure logins like SSH the SRMA can provide the needed security.VTY ports can allow more than one user to be logged into the device atthe same time while only one user can be logged into the console port ata time.

The SRMA can also monitor the physical connectivity of a telephone lineto the SRMA and send an alert if the telephone line is disconnected.Often the SRMA is in place to assist with problem determination andresolution when there is an outage in the network. It might be that thetelephone connection to the SRMA does not get used very often. It is notunheard of for a telephone line to a modem on a console port to havegone for weeks and months without working and no one noticing. When itis needed, such as when there is an outage, it is important to know thatthe telephone connection will be there and working. Monitoring theconnection to the line assists in doing this.

When a telephone line is in the on-hook state, the line generallycarries a voltage. In the USA this is in the vicinity of −48V. Tomonitor a line that is in the on-hook state it is important to draw verylittle current if any at all. A FET transistor circuit would be a goodcandidate for this circuit. A connection from the telephone line wouldbe connected to the gate of the FET transistor. While a high enoughnegative voltage was maintained on the line, the FET would be in pinchoff state and no current would flow between the source and the drain. Ifthe negative voltage was removed from the line and the voltage at thegate went to zero, the FET would allow current to begin flowing betweenthe source and the drain on the transistor. The circuit could detect theflowing current or the circuit could be designed so that the currentflow caused a voltage drop at the output to the circuit. This voltagedrop could be noted and used to trigger an alert that the line has beendisconnected while at the same time drawing very little if any currentin the steady state condition. This circuit would provide the mostaccurate indication of the status of the connectivity of the telephoneline when the modem portion of the SRMA is in the on hook state.

In situations where it is desirable not to physically monitor thevoltage on the telephone line a method for periodically monitoring thestatus of the telephone line is possible. The SRMA can be configured toperiodically go offshoot and dial a telephone number to test for linestatus. If no telephone number is provided to dial the SRMA can gooffshoot and monitor for dial tone. If dial tone is returned the SRMAwill consider the line still connected. While this will not provide forcontinuous monitoring of the connectivity, it will still detect the linebeing disconnected in a timely manner. If the telephone line iscurrently in use for a connection the SRMA will consider the lineconnected and will not need to do the test. The frequency at which thistest is performed can be configured.

The SRMA also provides for additional testing of the ability to send andreceive calls over the out-of-band network. A portion of a distributedCall Test application resides on the SRMA to assist with call testing.Another portion of the Call Test application resides on a Call TestServer in the Data Network. The Call Test Server also has connectivityto the out-of-band network. The SRMA can be configured to periodicallytest its ability to send and/or receive calls, or the Call Test Servercan be configured to periodically test the ability of the SRMA to sendand receive calls. A test can also be explicitly started from eitherparty.

When either side is beginning a test it establishes an applicationconnection with the other party over the Data Network. For instance, ifthe SRMA were initiating the test, it would initiate a connection to theCall Test Server. To test the ability of the SRMA to receive calls, theSRMA or the Call Test Server would send a Call Test In request over thedata network connection and the other party would replay with anavailable if it is available for a test at that time. If it were notavailable, the other party would reply with a busy response. Either onthe Call Test In request or the Available reply the SRMA will indicateits number to the Server that the server is to call. If the Server has adatabase of SRMA phone numbers it will verify that this number matches.The Server will then place a call to the SRMA over the out-of-bandconnection. Since the SRMA is expecting the call from the Call TestServer, it will connect the call to the Call Test application on theSRMA. The Call Test Server will then transmit some random data to theSRMA over the out-of-band connection. The SRMA will then send thisrandom data to the Call Test Server over the in-band connection. If thedata matches, the Call Test Server will send a VERIFIED message to theSRMA over the in-band connection to indicate the test was successful.

To test the ability of the SRMA to place calls, after the in-bandconnection has been established, the SRMA or the Call Test Server willsend a Call-Test-Out request over the in-band connection. The otherparty will reply with an Available message if they are available for atest at that time. If they are not available at that time they willrespond with a Busy message. On either the Call-Test-Out message or theAvailable message the Call Test Server will provide the SRMA with thephone number to call for the test. The SRMA will then place a test callto the Call Test Server over the out-of-band network. When the serveranswers, the SRMA will transmit some random data over the out-of-bandconnection. The Call Test Server will then send the test data to theSRMA over the in-band connection. If the data is the same then the SRMAwill transmit a Verified message to the Call Test Server over thein-band connection to indicate the test was successful. While it doesn'tmatter which side sends the random data, this exemplary embodiment hasthe side placing the call also sending the random data.

The SRMA also provides a means to power cycle the network device. Thenetwork device can be connected to its power supply through the SRMA.The SRMA will have a relay inline between the power supply and thenetwork device. When the remote administrator requests a device be powercycled the relay is opened disrupting the power supply to the device.The power is then restored to the device and the remote operator hasconnectivity to the device console to view boot messages and/or entercommands to perform password recovery remotely. In the event of anetwork device that has dual power supplies, a version of the SRMA canhave two power sources coming in and feed two supplies to the device.When an authorized remote operator requests the power to be cycles, theSRMA will disrupt both power supplies simultaneously.

For the SRMA to be as beneficial as possible it is important for theout-of-band connection to be available for legitimate traffic. Thisaccess could be taken away by an attack on the local loop connecting theSRMA to the PSTN local service provider. If an unauthorized user dialsin repeatedly, even though they do not get authorized, they are stilltying up the local loop connecting the SRMA to the out-of-band network.In fact large ISPs have come under attack by Distributed DoS attackswhere illegitimate traffic ties up their modem pools so the legitimateusers cannot get access to the ISP. I will refer to this as Local LoopDoS (LLDoS).

A first step in LLDoS protection is to monitor Caller ID and to note theCaller ID of connections that failed to authenticate. If a set number offailures from that number occur without any successful authenticationsfrom that number then the SRMA will not longer attempt to authenticatecalls from that number for a set length of time. Instead, the SRMA willsimply answer and immediately hang up on that number. The SRMA can alsobe configured to reject calls that are marked a P or O for a set lengthof time when the SRMA is under attack.

An alternative solution for LLDoS protection is for the SRMA to haveconnectivity to an LLDoS Defender application in the Data Network. Whenthe SRMA has a call that fails to authenticate, it reports the callingnumber to the LLDoS defender application. Even if the calling number isnot available, the SRMA reports P and O calls that did not authenticate.If the SRMA or the network appears to be under an LLDoS attack, theLLDoS Defender application talks with an LLDoS defender application inthe Local Telephone Service Provider network to report a potentialattack is taking place. The LLDoS Defender application in the DataNetwork provides the LLDoS Defender application in the ServiceProvider's network with a list of calling numbers it wants blocked fromcalling the SRMA.

In addition, the defender application can indicate that it wants theService provider to block the last call the SRMA received even if theCaller ID was blocked so that the SRMA does not know the number. Theservice provider still knows the number and can block the caller. Whenthe defender application requests a Caller ID blocked call to beblocked, the defender application is given a reference number for thatcaller since the actual phone number cannot be released by the serviceprovider. This way the defender application can unblock the caller bythe reference number if it chooses to do so. The defender applicationcan also request that all P and O calls be blocked.

In addition to providing a list of callers to block, the defenderapplication can notify the service provider that an attack is takingplace and request that the service provider begin collecting forensicdata. This way additional data could be available to proper authoritiesis it is determined an attack took place and they need to investigate.

In the event that the SRMA is not able to connect to the LLDoS Defenderapplication through a Data Network connection, and the SRMA comes underattack, the SRMA can attempt to dial out between attack calls and calleither the LLDoS Defender application directly or call a NAS to connectto the LLDoS Defender application and report that an attack seems to beunder way and provide a list of attacking numbers.

While the description above refers to particular embodiments of thepresent invention, it will be understood that many modifications may bemade without departing from the spirit thereof. The accompanying claimsare intended to cover such modifications as would fall within the truescope and spirit of the present invention.

1. A remote device management communications system for securelycontrolling access to management applications and communicating devicemanagement traffic to and from said management applications on networkdevices in a distributed computer network that includes one or morenetwork services, one or more secure remote management appliances, andone or more managed network elements, the remote device managementcommunications system comprising: one or more secure remote managementappliances; a management connection means for operatively coupling saidsecure remote management appliance to one or more of said managednetwork elements, said management connection means configured tocommunicate said device management traffic between said secure remotemanagement appliance and said managed network element, said managementconnection means selected from the group consisting of a console digitalconnection and a connection to a dedicated management segment; an analogconnection means for operatively coupling said secure remote managementappliance and an analog communication system, said analog connectionmeans configured to communicate said device management traffic betweensaid secure remote management appliance and one or more managementcommunications partners, said management communications partnersselected from the group consisting of said network services and remoteadministrators; and one or more digital communication means foroperatively coupling said secure remote management appliance and adigital communications network, said digital communication meansconfigured to communicate said device management traffic between saidsecure remote management appliance and one or more managementcommunications partners, said management communications partnersselected from the group consisting of said network services and remoteadministrators.
 2. The system described in claim 1, wherein the analogconnection means is a modem.
 3. The system described in claim 1, whereinthe analog connection means is a modem capable of communicating througha network selected from the group consisting of a Public SwitchedTelephone Network or an Integrated Services Digital Network.
 4. Thesystem described in claim 1, wherein the at least one digitalcommunication means is selected from the group consisting of a localarea network, a serial interface or a network connection.
 5. The systemdescribed in claim 1, wherein the at least one digital communicationmeans supports at least one protocol selected from the group consistingof Transmission Control Protocol/Internet Protocol, Simple NetworkManagement Protocol, Telnet, Hypertext Transfer Protocol or SecureShell.
 6. The system described in claim 1, wherein the at least onedigital communication means includes a network interface for reporting astatus of network elements to a network management station.
 7. Thesystem described in claim 1, wherein the at least one digitalcommunication means includes a network interface which allows for remoteconfiguration of the computer network management system.
 8. The systemdescribed in claim 1, further comprising a means for authenticating aremote user through use of the at least one digital communication means.9. The system described in claim 1, further comprising a means forauthorizing access to the computer network for a remote user through useof the at least one digital communication means.
 10. The systemdescribed in claim 1, further comprising an internal means forauthenticating a remote user.
 11. The system described in claim 1,further comprising an internal means for authorizing access to thecomputer network for a remote user.
 12. The system described in claim 1,further comprising a means for controlling a remote user's access to thecomputer network.
 13. The system described in claim 1, furthercomprising a means for encrypting communications carried by the analogcommunication system.
 14. The system described in claim 1, furthercomprising a means for monitoring the status of the at least one digitalcommunication means.
 15. The system described in claim 1, furthercomprising a means for monitoring the status of the at least one digitalcommunication means and a means for sending a status update through theanalog connection means if the status changes.
 16. The system describedin claim 1, further comprising a means for monitoring the status of theanalog connection means.
 17. The system described in claim 1, furthercomprising a means for monitoring the status of the analog connectionmeans and a means for sending a status update through the at least onedigital communication means if the status changes.
 18. The systemdescribed in claim 1, wherein one or more of the network elements areserviced by a power supply and further comprising a means for monitoringthat power supply.
 19. The system described in claim 1, furthercomprising an independent power supply.
 20. The system described inclaim 19, wherein one or more of the network elements are serviced by apower supply and further comprising: a means for monitoring the powersupply; and a means for sending a status update through the analogconnection means if the status of the power supply changes wherein theindependent power supply supplies power to the computer networkmanagement system if the power supply has failed.
 21. The systemdescribed in claim 1, further comprising a means for remotelyinterrupting power to a device connected to the computer network. 22.The system described in claim 1, further comprising a means formonitoring connection attempts made through the analog connection means.23. The system described in claim 1, further comprising a means forselectively blocking connection attempts made through the analogconnection means.
 24. The system described in claim 1, furthercomprising a means for a remote administrator to connect to themanagement system in an administrative mode through the analogconnection means by using a specially configured modem.
 25. A managementsystem for a secure environment for a distributed computer network,comprising: an embedded processor in a network management appliance; amanagement connection means for connecting to a network element selectedfrom the group consisting of a console connection or a digitalconnection to a dedicated management segment; an analog connection meansfor connecting to an analog communication system; at least one digitalcommunication means for connecting to the computer network, wherein theat least one digital communication means includes: a network interfacefor reporting a status of the computer network to a network managementappliance; and a network interface which allows for remote configurationof the computer network management system; and a means forauthenticating a remote user; a means for authorizing access to thecomputer network for a remote user; a means for controlling a remoteuser's access to the computer network; a means for encryptingcommunications carried by the analog communication system; a means formonitoring the status of the at least one digital communication means; ameans for sending a status update through the analog connection means ifthe status of the at least one digital communication means changes; ameans for monitoring the status of the analog connection means; a meansfor sending a status update through the at least one digitalcommunication means if the status of the analog connection meanschanges; a means for monitoring a power supply supplying power to one ormore network elements; an independent power supply; a means for sendinga status update through the analog connection means if the status of thepower supply supplying power to the network elements changes wherein theindependent power supply supplies power to the network managementappliance if the power supply supplying power to the network elementshas failed; a means for remotely interrupting power to a deviceconnected to the computer network; a means for monitoring connectionattempts made through the analog connection means; and a means forselectively blocking connection attempts made through the analogconnection means.
 26. A management system for a secure environment for adistributed computer network, comprising: an embedded processor in anetwork management appliance; a management connection means forconnecting to a network element selected from the group consisting of aconsole connection or a connection to a dedicated management segment; ananalog connection means for connecting to an analog communication systemcapable of communicating through a network selected from the groupconsisting of a Public Switched Telephone Network or an IntegratedServices Digital Network; at least one digital communication means forconnecting to the computer network selected from the group consisting ofa local area network, a serial interface or a network connection,wherein the at least one digital communication means supports at leastone protocol selected from the group consisting of Transmission ControlProtocol/Internet Protocol, Simple Network Management Protocol, Telnet,Hypertext Transfer Protocol or Secure Shell and wherein the at least onedigital communication means includes: a network interface for reportinga status of the computer network to a network management station; and anetwork interface which allows for remote configuration of the computernetwork management system; a means for authenticating a remote user; ameans for authorizing access to the computer network for a remote user;a means for controlling a remote user's access to the computer network;a means for encrypting communications carried by the analogcommunication system; a means for monitoring the status of the at leastone digital communication means; a means for sending a status updatethrough the analog connection means if the status of the at least onedigital communication means changes; a means for monitoring the statusof the analog connection means; a means for sending a status updatethrough the at least one digital communication means if the status ofthe analog connection means changes; a means for monitoring a powersupply supplying power to the network elements; an independent powersupply; a means for sending a status update through the analogconnection means if the status of the power supply supplying power tothe network elements changes wherein the independent power supplysupplies power to the network management appliance if the power supplysupplying power to the network elements has failed; a means for remotelyinterrupting power to a device connected to the computer network; ameans for monitoring connection attempts made through the analogconnection means; and a means for selectively blocking connectionattempts made through the analog connection means.
 27. In a distributedcomputer network comprising one or more secure remote managementappliances, one or more network services, one or more managed networkelements, one or more digital communication means, and one or moreanalog communication means, a method for securely controlling access tomanagement applications and conveying network management information toand from said management applications on said managed network elements,said method comprising the steps of: (a) operatively coupling one ormore of said managed network elements with one or more of said secureremote management appliances for the conveyance of said networkmanagement information between said managed network element and saidsecure remote management appliance, said operative coupling performed byoperative coupling means selected from the group consisting of a consoledigital connection and a connection to a dedicated management segment;(b) operatively coupling one or more of said secure remote managementappliances and one or more of said analog communication means, saidanalog communication means enabling the conveyance of said networkmanagement information between said secure remote management appliancesand one or more management communications partners, said managementcommunications partners selected from the group consisting of saidnetwork services and remote administrators; (c) operatively coupling oneor more of said secure remote management appliances and one or more ofsaid digital communication means, said digital communication meansenabling the conveyance of said network management information betweenone or more of said secure remote management appliances and one or moreof said management communications partners, said managementcommunications partners selected from the group consisting of saidnetwork services and remote administrators; and (d) conveying saidnetwork management information between one or more of said managementcommunications partners and one or more of the group consisting of saidsecure remote management appliances and said managed network elements,utilizing one or more of the group consisting of said analogcommunications means and said digital communications means, wherein saidnetwork management information is conveyed to assist in the managementof one or more of said managed network elements.
 28. The method of claim27, wherein said operative coupling of one or more of said networkmanagement appliances with said analog communication means is performedby an analog modem.
 29. The method of claim 27, wherein said operativecoupling of one or more of said network management appliances with saiddigital communication means is performed by operative coupling meansselected from the group consisting of a local area network and a serialcommunication interface.
 30. The method of claim 27, further comprising:utilizing one or more of the protocols selected from the groupconsisting of Transmission Control Protocol/Internet Protocol, SimpleNetwork Management Protocol, Telnet, Hypertext Transfer Protocol, andSecure Shell for communication between one or more of said managementcommunications partners and one or more of a group consisting of saidsecure remote management appliances and said managed network elementswhile at least part of the communication path traverses one or more ofsaid analog communication means.
 31. The method of claim 27, furthercomprising: providing, by one or more of said secure remote managementappliances, status information about one or more of said managed networkelements to one or more of said management communications partnersutilizing one or more of said digital communication means.
 32. Themethod of claim 27, further comprising: remotely configuring one or moreof the group consisting of said secure remote management appliances andsaid managed network elements by one or more of said managementcommunications partners, utilizing one or more of said digitalcommunication means.
 33. The method of claim 27, further comprising:remotely configuring one or more of the group consisting of said secureremote management appliances and said managed network elements by one ormore of said management communications partners, utilizing one or moreof said analog communication means.
 34. The method of claim 27, furthercomprising: providing, by one or more of said secure remote managementappliances, one or more access control services, said access controlservices selected from the group consisting of authenticating useridentity and authorizing user access to one or more of the groupconsisting of said secure remote management appliances and said managednetwork elements, said secure remote management appliance utilizing oneor more of said digital communication means for conveying said networkmanagement information between said secure remote management applianceand said network services enabling said network services to assist saidsecure remote management appliance in providing said access controlservices.
 35. The method of claim 27, further comprising: providing, byone or more of said secure remote management appliances, one or moreaccess control services, said access control services selected from thegroup consisting of authenticating user identity and authorizing useraccess to one or more of the group consisting of said secure remotemanagement appliances and said managed network elements, said secureremote management appliance utilizing one or more of said analogcommunication means for conveying said network management informationbetween said secure remote management appliance and said networkservices enabling said network services to assist said secure remotemanagement appliance in providing said access control services.
 36. Themethod of claim 27, further comprising: providing, by one or more ofsaid secure remote management appliances, one or more access controlservices, said access control services selected from the groupconsisting of authenticating user identity and authorizing user accessto one or more of said secure remote management appliances, said accesscontrol services provided by said secure remote management appliancewithout the assistance of said network services at the time said accesscontrol services are provided.
 37. The method of claim 27, furthercomprising: providing, by one or more of said secure remote managementappliances, one or more access control services, said access controlservices selected from the group consisting of authenticating useridentity and authorizing user access to one or more of said managednetwork elements, said access control services provided by said secureremote management appliance without the assistance of said networkservices at the time said access control services are provided.
 38. Themethod of claim 27, further comprising: encrypting at least a portion ofthe said network management information while said network managementinformation is being conveyed by one or more of said analogcommunication means.
 39. The method of claim 27, further comprising:encrypting at least a portion of the said network management informationwhile said network management information is being conveyed by one ormore of said digital communication means.
 40. The method of claim 27,further comprising: monitoring, by one or more of said secure remotemanagement appliances, a status of said operative coupling of saidsecure remote management appliances to one or more of said digitalcommunication means.
 41. The method of claim 40, further comprising:conveying, by said secure remote management appliance, one or morestatus updates of said status to one or more of said managementcommunications partners utilizing one or more of said analogcommunication means.
 42. The method of claim 27, further comprising:monitoring, by one or more of said secure remote management appliances,a status of said operative coupling of said secure remote managementappliances to one or more of said analog communication means.
 43. Themethod of claim 42, further comprising: conveying, by said secure remotemanagement appliance, one or more status updates of said status to oneor more of said management communications partners utilizing one or moreof said digital communication means.
 44. The method of claim 27, furthercomprising: monitoring, by one or more of said secure remote managementappliances, a status of one or more power source providing power to oneor more of the group consisting of said secure remote managementappliances and said managed network elements.
 45. The method of claim27, wherein one or more of said secure remote management appliancesfurther comprises a power source that is independent from a power sourceutilized by one or more operatively coupled managed network elements.46. The method of claim 45, further comprising: (a) monitoring, by saidsecure remote management appliance, a status of one or more power sourceproviding power to one or more of the group consisting of said secureremote management appliances and said managed network elements; and (b)conveying, by said secure remote management appliance, one or morestatus updates about said status of said power sources utilizing one ormore of said analog communication means.
 47. The method of claim 27,further comprising: interrupting, by one or more of said secure remotemanagement appliances, a flow of power between a power source and one ormore of the group consisting of said secure remote management appliancesand said managed network elements.
 48. The method of claim 27, furthercomprising: monitoring, by one or more of said secure remote managementappliances, user access attempts to said secure remote managementappliance that utilize said one or more analog communication means. 49.The method of claim 48, further comprising: selectively blocking, bysaid secure remote management appliances, said user access attempts.