Preview

Unit 3 assignment 1

Good Essays
Open Document
Open Document
479 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 3 assignment 1
Purpose
The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards are designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman Investments internal systems, etc.
Scope
This policy applies to all Richman Investments employees, contractors, vendors and agents with a Richman Investments owned or personally-owned computer or workstation used to connect to the Richman Investments network. This policy applies to remote access connections used to do work on behalf of Richman Investments including reading or sending email and viewing intranet web resources and wireless devices.
Remote access implementations that are covered by this policy include, but are not limited to, dial-in
Modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc.

VPN access control model for a large scale company.
* This policy will support remote access control for systems, applications, and data access.

Remote access Defined
Remote access for employees is deployed by using remote access VPN connections across the Internet based on the settings configured for the VPN Server, and the following additional settings.
The following diagram shows the VPN server that provides remote access VPN connections.

Domain/Network Config:
For each employee that is allowed VPN access:
* The network access permission on the dial-in properties of the user account is set to Control access through NPS Network Policy.
* The user account is added to the VPN_Users group in Active Directory.
To define the authentication and encryption settings for remote access VPN clients, the following remote access network policy is created in Network Policy Server (NPS):
* Policy name: Remote Access

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Router Management Out-of-Band Management Username and Password Authentication. Traffic VPN and Tunnel Based Traffic ACL and Tunnel Traffic Established Between Trusted End Points. UDP and TCP Protocol Enforcement with Stateful Firewall Access list Source and Destination, Address and Session established with Layer 7 Firewall Protection.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Sometimes users will be able to connect to the remote access VPN server but are unable to connect to any resources on the corporate network. They are unable to resolve host names and unable to even ping resources on the corporate network.…

    • 1528 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards have been designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include intellectual property, the loss of sensitive or company confidential data, damage to critical Richman Investments internal systems, damage to public image, etc.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This document is designed to provide definition of the standards for connecting remotely to Richman Investments’ network outside of the company’s direct network connection. The standards defined here are designed to mitigate exposure to potential damage to Richman Investments’ network, resulting from the use of unauthorized use of network resources.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Network Layout 4 : VPN (Remote Access Domain) – Virtual Private Networks (VPNs) with VPN software and Secure Socket Layer/VPN (SSL/VPN) tunnels…

    • 601 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Server Security Policy

    • 708 Words
    • 3 Pages

    1.0 Purpose The purpose of this policy is to establish standards for the base configuration of internal server equipment that is owned and/or operated by . Effective implementation of this policy will minimize unauthorized access to proprietary information and technology. 2.0 Scope This policy applies to server equipment owned and/or operated by , and to servers registered under any -owned internal network domain. This policy is specifically for equipment on the internal network. For secure configuration of equipment external to on the DMZ, refer to the Internet DMZ Equipment Policy. 3.0 Policy 3.1 Ownership and Responsibilities All internal servers deployed at must be owned by an operational group that is responsible for system administration. Approved server configuration guides must be established and maintained by each operational group, based on business needs and approved by InfoSec. Operational groups should monitor configuration compliance and implement an exception policy tailored to their environment. Each operational group must establish a process for changing the configuration guides, which includes review and approval by InfoSec. • Servers must be registered within the corporate enterprise management system. At a minimum, the following information is required to positively identify the point of contact: o Server contact(s) and location, and a backup contact o Hardware and Operating System/Version o Main functions and applications, if applicable Information in the corporate enterprise management system must be kept up-to-date. Configuration changes for production servers must follow the appropriate change management procedures.…

    • 708 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    1. As an employee of Richman Investments, you are responsible for using good judgment regarding the use of internet access. In ordnance with the policies set forth by Richman Investments resources may not be used for any unlawful or prohibited purpose. For extra security Richman Investments will monitor all systems, equipment, and network using the Audit Policy. Any devices that might interfere with the Richman Investments network will be immediately disconnected. Firewalls must be turn on at all times.…

    • 441 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The company’s computer network, including its connection to the Internet, is to be used for business-related purposes. Any unauthorized use of the Internet is strictly prohibited. Unauthorized use includes, but is not limited to, connecting, posting, or downloading pornographic material; engaging in computer “hacking” and other related…

    • 696 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Authentication- In order to keep the remote access to Richman Investments secure, there must be proof that the person trying to gain access to the network remotely is the same person who has been granted access by identification. To do this RI can choose one of the following knowledge type authentications: PIN, password, or passphrase along with one of the following ownership type of authentication: smart card, key, badge, or token. Using a combination of ownership authentication and knowledge authentication proves to offer better security.…

    • 302 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    LAN/WAN Topology

    • 1805 Words
    • 7 Pages

    Discussed is the use of Access Control Lists, Virtual Private Networks (VPN), Network Address Translation (NAT), Protocol Address Translation (PAT), IPv6, Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), Point-to-Point (PPP), Frame Relay, and Internet Protocol addressing schemes. Included are descriptions, configurations, implementation plans, and various debug commands to help administrators pinpoint and resolve connection issues.…

    • 1805 Words
    • 7 Pages
    Better Essays
  • Good Essays

    SDLC

    • 550 Words
    • 3 Pages

    Although networks have different policies depending on their needs, some common policies include the following:…

    • 550 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Network Design Proposal

    • 731 Words
    • 3 Pages

    Remote access to the network is required as some employees may work from home, and employees working offsite would also need access to the network from devices such as PDAs.…

    • 731 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cisco - Vpn Configuration

    • 9191 Words
    • 37 Pages

    A site-to-site VPN protects the network resources on your protected networks from unauthorized use by users on an unprotected network, such as the public Internet. The basic configuration for this type of implementation has been covered in Chapter 6, “Configuring IPSec and Certification Authorities.” This chapter provides examples of the following site-to-site VPN configurations:…

    • 9191 Words
    • 37 Pages
    Good Essays
  • Powerful Essays

    Virtual Private Networks

    • 5307 Words
    • 22 Pages

    With the increasing popularity of the Internet, new technologies have introduced to provide secure access to the resources from remote clients. Virtual Private Networks are becoming the most universal method for remote access. They enable service provider to take advantage of the power of Internet by providing a private tunnel through the public cloud to realize cost savings and productivity enhancements from remote access applications. VPNs securely convey information across the Internet connection to remote users, branch offices and business partners into an extended corporate network. This paper is an attempt to provide an overview of VPN and its services and how the network security concerns are addressed. It begins by explaining the architecture and types of VPNs used. It then describes the various goals of VPN. Next it explains the basics of tunneling mechanism and how the various tunneling protocols can be used to provide secured communication over the public Internet. Further it compares the basic VPN architectures – MPLS- and IPSec-based VPN architecture. The paper concludes with a brief discussion of advantages and disadvantages of VPN and the essential attributes of the VPN architecture.…

    • 5307 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    Network Security

    • 523 Words
    • 3 Pages

    * Provides adequate security for all of the company communications and documents (especially sensitive sales documents). All POS services must be protected. All general network access should be segmented from the company POS services.…

    • 523 Words
    • 3 Pages
    Good Essays