Nad710 Linux Network Security
-
Upload
tmavroidis -
Category
Technology
-
view
205 -
download
6
description
Transcript of Nad710 Linux Network Security
NAD710 – Linux Network NAD710 – Linux Network Security Security
How to Protect Your Network
May 25, 2002Professor Tom Mavroidis
System Assessment System Assessment
User AccountsAccess Control listsNetwork Access ControlEncryptionLoggingIntrusion Detection
Protect the ExteriorProtect the Exterior
First you’ll need an exterior router
Routers come in many forms, you have to choose based on your needs
Some are basic (Linksys) Others advanced (Cisco)
Why CiscoWhy Cisco
You would generally need a sophisticated router to be able to block unwanted incoming traffic
Cisco has many different lines of routers to suit any business need
Cisco IOS SoftwareCisco IOS Software
Cisco uses its IOS software to control its routers and switches.
This IOS software make Cisco routers some of the most powerful and versatile routers in the industry
Entry Level RoutersEntry Level Routers
If you don’t need such a sophisticated router you can use one of the entry level routers like Linksys, Dlink or SMC. Each come with their own proprietary configuration screens
Perimeter SecurityPerimeter Security
Perimeter security devices inside the network are designed to control access to networks and to hide data moving outside the network. There are numerous vulnerabilities inside the network. Secure networking cannot be achieved without addressing these vulnerabilities.
Perimeter SecurityPerimeter Security
This element provides the means to control access to critical network applications, data, and services so that only legitimate users and information can pass through the network.
Controlling who gets inControlling who gets in
Routers and switches with access control lists and/or stateful firewalling, as well as dedicated firewall appliances provide this control.
Complementary tools, including virus scanners and content filters, also help control network perimeters