Preview

Network Final

Satisfactory Essays
Open Document
Open Document
358 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Final
Security

Security document: Session 8
Laura Abraham
Telecommunications Networks: CIS 313-DL
Security will be implemented throughout different areas of the network:
The main security will be the Cisco firewall:
The IOS firewall works at both the network and application layer. This means that not only are we protected against intrusion at the network layer, the firewall will also protect against any application resources that we implement. Different firewall policies can be configured for the WAN, LAN and VLANs that we may implement. This is important as different user groups will need different types of access to the WAN. For example: the public wireless hotspot will need much more protection than the operations side in respect to what they can and cannot access.
The Cisco IOS firewall also protects SIP which is the voice protocol. This is very important for our future voip needs.
Wireless LAN:
Lan will use WPA2 authentication for all wireless devices. WPA2 is important as it can be configured for any device including phones and wireless printers
VLAN:
Lan will be configured with VLans. This will depend on the amount of VLANS needed. For example, if a wireless hotspot is required in the conference room for visiting clients or suppliers, we will supply a wireless connection through a VLan that will enable them to access the internet without access to our operations network. This can also be implemented for scenarios like students vs operations. This will isolate traffic allowing for internal security.
Vlans are not inherently secure but the Cisco router and the intelligent switched enable for packet identification in order to secure the VLAN.

Mobile VPN:
All remote access clients will use L2TP Mobile VPN in order to access any resources at the company site. Any company owned laptops must access the internet through the VPN program in order to maintain integrity of data on external devices. This will allow any wireless device including smart



References: Why VPN can’t replace Wi-Fi security retrieved on 11.11.2011 from: http://www.zdnet.com/blog/ou/why-vpn-cant-replace-wi-fi-security/489?pg=2&tag=content;siu-container

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Router Management Out-of-Band Management Username and Password Authentication. Traffic VPN and Tunnel Based Traffic ACL and Tunnel Traffic Established Between Trusted End Points. UDP and TCP Protocol Enforcement with Stateful Firewall Access list Source and Destination, Address and Session established with Layer 7 Firewall Protection.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    VLAN has a great deal of functionality to networks. They are created mainly for separating the network in to separate broadcast each representing separate functionalities or physical locations within an organization.…

    • 682 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Sdsa300 Unit 1

    • 178 Words
    • 1 Page

    Most would say VPN is the low-cost way to establish remote connections between offices and to securely provide connections to a mobile workforce. The central office should be equipped with a VPN concentrator that is configured to maintain the number of connections to be serviced for the mobile sales force. In order to provide complete network access to the mobile workforce the use of IPSec with L2TP, ESP, AH, using SHA-256, RSA2048 and AES256 is recommended over a UDP transport. Each branch office and the central office will require a point of presence to the Internet along with a local loop that provides enough bandwidth to accommodate the office demands. In order to keep cost to a minimum, it is recommended that SDSL be used at each branch…

    • 178 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    When designing the layout of a LAN, the party can choose from a selection of different technologies on which to base the main part of their LAN. The technology choices that the party adopts will be a critical part in the way their LAN performs. Two important LAN setups are a network based on Ethernet or Token Ring technology. Besides operating in a small space, LANs have some other distinctive features. LANs are typically owned, controlled, and managed by a single person or organization.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    In the WAN domain, we need to have firewalls set up to filter all incoming traffic. A firewall will stop all traffic not wanted on the Richman Investments network.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The firewall process can tightly control what is allowed to traverse from one side to the other. As with most aspects of security, deciding what type of firewall to use will depend upon factors such as traffic levels, services needing protection and the complexity of rules required. The difficulty for firewalls is distinguishing between legitimate and illegitimate traffic. Firewalls, if configured correctly, can be a reasonable form of protection from external threats including some denial of service (DOS) attacks. If not configured correctly they can be major security holes in an organization. The most basic protection a firewall provides is the ability to block network traffic to certain destinations. This includes both IP addresses and particular network service ports.…

    • 1578 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Remote access means allowing people to access your business computer systems even when not directly connected to your company network. Options for giving salespeople wireless remote access to the home office server are as follows:…

    • 498 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Remote Access will provide the Virtual Private Networks with services that the users can use to access the corporate networks over the Internet as it they were directly connected. This remote access will enable the remote…

    • 623 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    For the LAN domain, Make sure wiring closets, data centers, and computer room are secure. Use a WLAN network keys that require a password for wireless access. And implement encryption between workstation and WAP to maintain confidentiality.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    A VLAN-enabled Ethernet network will require several devices to operate correctly. First, switches will need to be connected to the network’s assets and be configured to section them off into the correct VLANs. Cabling will be needed to connect the assets to the switches, switches to each other, and the switches to the router. Routers will be required so the VLANs can communicate with each other and be able to communicate outside the network.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Unit 3 assignment 1

    • 479 Words
    • 2 Pages

    Remote access for employees is deployed by using remote access VPN connections across the Internet based on the settings configured for the VPN Server, and the following additional settings.…

    • 479 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Se571 Aircraft Solutions

    • 1896 Words
    • 8 Pages

    Overall the network has solid hardware firewall protection at every public network connection but one. The Commercial Division(CD) in Chula Vista, CA does not have a hardware firewall protection, it is connected directly to the public internet. The CD is directly connected to the headquarters in San Diego which contains the IT, Finance and S&M servers. These servers are vulnerable to attack since there is not a firewall in place to prevent an intrusion.…

    • 1896 Words
    • 8 Pages
    Best Essays
  • Good Essays

    Security is a fundamental aspect of any network infrastructure. The goal is to always have the most up to date programs and protocols to ensure the protection of the network. No aspect is too small to over look. That could mean the difference between a secure network and a compromised network. The best way to achieve this is to break down every level and approach each one as a separate entity and secure it. Then you can modify it to suit the needs of your network.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Vlan

    • 764 Words
    • 4 Pages

    Another challenge of using VLAN is the location of servers that may be located in a specific area for security and back up purposes. If a servers can't be placed on multiple VLANs. A router would be necessary to allow other VLANs to access resources. Workstations can be shifted from one department to another without adding software or cabling. VLANs can be used to create secure user groups. It can also prevent outside hackers from receiving sensitive data because of the VLANs ability to enhance firewall functions. Implementing a VLAN will benefit the company with increased security, improved manageability, increased performance, decreases bandwidth consumption, an independent physical topology, automatic network tuning and self…

    • 764 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Kpop Addict

    • 327 Words
    • 2 Pages

    The PRC also pointed to the lack of security, but Ricalde said this concern has been addressed by GSI as the system would use "state-of-the-art" firewalls and other security features.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays