Nad710 Linux Network Security
-
Upload
tmavroidis -
Category
Technology
-
view
205 -
download
6
description
Transcript of Nad710 Linux Network Security
![Page 1: Nad710 Linux Network Security](https://reader035.fdocuments.in/reader035/viewer/2022080210/5554c89eb4c90503388b5389/html5/thumbnails/1.jpg)
NAD710 – Linux Network NAD710 – Linux Network Security Security
How to Protect Your Network
May 25, 2002Professor Tom Mavroidis
![Page 2: Nad710 Linux Network Security](https://reader035.fdocuments.in/reader035/viewer/2022080210/5554c89eb4c90503388b5389/html5/thumbnails/2.jpg)
System Assessment System Assessment
User AccountsAccess Control listsNetwork Access ControlEncryptionLoggingIntrusion Detection
![Page 3: Nad710 Linux Network Security](https://reader035.fdocuments.in/reader035/viewer/2022080210/5554c89eb4c90503388b5389/html5/thumbnails/3.jpg)
Protect the ExteriorProtect the Exterior
First you’ll need an exterior router
Routers come in many forms, you have to choose based on your needs
Some are basic (Linksys) Others advanced (Cisco)
![Page 4: Nad710 Linux Network Security](https://reader035.fdocuments.in/reader035/viewer/2022080210/5554c89eb4c90503388b5389/html5/thumbnails/4.jpg)
Why CiscoWhy Cisco
You would generally need a sophisticated router to be able to block unwanted incoming traffic
Cisco has many different lines of routers to suit any business need
![Page 5: Nad710 Linux Network Security](https://reader035.fdocuments.in/reader035/viewer/2022080210/5554c89eb4c90503388b5389/html5/thumbnails/5.jpg)
Cisco IOS SoftwareCisco IOS Software
Cisco uses its IOS software to control its routers and switches.
This IOS software make Cisco routers some of the most powerful and versatile routers in the industry
![Page 6: Nad710 Linux Network Security](https://reader035.fdocuments.in/reader035/viewer/2022080210/5554c89eb4c90503388b5389/html5/thumbnails/6.jpg)
Entry Level RoutersEntry Level Routers
If you don’t need such a sophisticated router you can use one of the entry level routers like Linksys, Dlink or SMC. Each come with their own proprietary configuration screens
![Page 7: Nad710 Linux Network Security](https://reader035.fdocuments.in/reader035/viewer/2022080210/5554c89eb4c90503388b5389/html5/thumbnails/7.jpg)
Perimeter SecurityPerimeter Security
Perimeter security devices inside the network are designed to control access to networks and to hide data moving outside the network. There are numerous vulnerabilities inside the network. Secure networking cannot be achieved without addressing these vulnerabilities.
![Page 8: Nad710 Linux Network Security](https://reader035.fdocuments.in/reader035/viewer/2022080210/5554c89eb4c90503388b5389/html5/thumbnails/8.jpg)
Perimeter SecurityPerimeter Security
This element provides the means to control access to critical network applications, data, and services so that only legitimate users and information can pass through the network.
![Page 9: Nad710 Linux Network Security](https://reader035.fdocuments.in/reader035/viewer/2022080210/5554c89eb4c90503388b5389/html5/thumbnails/9.jpg)
Controlling who gets inControlling who gets in
Routers and switches with access control lists and/or stateful firewalling, as well as dedicated firewall appliances provide this control.
![Page 10: Nad710 Linux Network Security](https://reader035.fdocuments.in/reader035/viewer/2022080210/5554c89eb4c90503388b5389/html5/thumbnails/10.jpg)
Complementary tools, including virus scanners and content filters, also help control network perimeters
![Page 11: Nad710 Linux Network Security](https://reader035.fdocuments.in/reader035/viewer/2022080210/5554c89eb4c90503388b5389/html5/thumbnails/11.jpg)