Why are the VG Security Features Effective?
The following reasons illustrate why the security features of VG are effective and are valuable to both the workgroup and enterprise: • These features are implemented in the hub and do not depend on hardware or software that runs on nodes or workstations to be effective. So, if the networks’ hubs are physically secure (pretty easy to do), then a VG network can have a very high degree of data-link level security. • These features are completely transparent to legitimate network users! They do not interfere, in any way, with the normal use of the network. Users can turn their machines on and off, log them in and out, or whatever, just like they would on regular Ethernet, Token Ring, FDDI, or ARCnet. • Since all these security features are implemented in the hub, they can be centrally managed by traditional management tools that are already in place in most medium sized and large organizations. Security is a complex problem and good solutions to it will be implemented in layers. VG provid