TCPWave IPAM is the world’s first acclaimed DNS/DHCP management software to pass the most stringent Information security tests. TCPWave IPAM has nullified attacks and exploits using the vector attack methods such as SQL Injection, SQL Injection (Boolean), SQL Injection (Blind), Cross-site Scripting, Command Injection, Command Injection (Blind), Local File Inclusion, Remote File Inclusion, Code Evaluation, HTTP Header Injection, Open Redirection, Web App Fingerprint, WebDAV, Reflected File Download, Insecure Reflected Content, XML External Entity, File Upload, Cross-Origin Resource Sharing (CORS), HTTP Methods, Server-Side Request Forgery (Pattern Based), Server-Side Request Forgery (DNS), XML External Entity (Out of Band), Cross-site Scripting (Blind), Code Evaluation (Out of Band).
TCPWave has further enhanced the TACACS+ security by sending each keystroke typed by the users to the AAA logs. Multiple AAA servers can be configured into the TCPWave TACACS module so that the AAA process does not have a single point of failure.
Terminal Access Controller Access-Control System (TACACS+) is a remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS+ is a security application that provides centralized validation of users attempting to gain access to a router or network access server. TACACS+ services are maintained in a database on a TACACS+ daemon running, typically, on a UNIX workstation. The goal of TACACS+ is to provide a methodology for managing multiple network access points from a single management service.
The TCPWave appliances can self defend themselves against various security levels. They can calculate the baseline trend and compare the DNS traffic pattern with the baseline. Any abnormality that takes place against the baseline is reported to the management via SNMP alerts.
Finally, the TCPWave appliances run bind as the non-root user and in a chroot directory to increase the security because if someone attempts to crack BIND, they cannot go beyond the chroot environment and make a malicious change to the underlying operating system.
TCPWave has also partnered with HP and has developed HPNA adapters to backup and restore the appliances. Our appliances reduce your backup costs significantly when compared to a full server backup. A tiny footprint of the configuration files is backed up by HPNA.
If the appliance fails, the Dell Technician replaces the failed drive within 4 hours (Dell support contract required). If both the drives fail, a new set of drives with the software pre-loaded is installed. The TCPWave IPAM or HPNA would then restore the original configurations, thereby getting you up and running much faster than our competition. When a TCPWave appliance is down, the business would not see any outage because of the multiple layers of redundancy in the design of the Anycast layer.