5.1 Security Considerations for Implementers

This protocol inherits the security considerations described in [MS-NRTP] section 5. Because this protocol specifies no authentication or authorization mechanisms, a protocol server can perform implementation-specific authorization only based on evidence from underlying transport mechanisms. Operational security can be enhanced by restricting transport layer access to the protocol servers to only known protocol clients, such as other computers in the farm.