A brief Description of the University Network By John G. mwangi Senior Network Administrator Jomo Kenyatta University of Agriculture and Technology.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Network Vulnerabilities and Attacks Dr. John Abraham UTPA.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Network Attacks Mark Shtern.
Firewalls and Intrusion Detection Systems
Presented by Serge Kpan LTEC Network Systems Administration 1.
Guide to Network Defense and Countermeasures Third Edition
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level &
1 Computer System Evolution Central Data Processing System: - with directly attached peripherals (card reader, magnetic tapes, line printer). Local Area.
ROYAL PALM NETWORK PROJECT John Healy Tom Jamieson
ACACIA Threaded Case Study Seamus Burns Ronan Conaghan Eugene Cullen.
COEN 252: Computer Forensics Router Investigation.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Treaded Case Study Computer Networks 2002 Daire Sheriden Ronan Monaghan Mark Gilmore.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Cisco PIX firewall Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu August 23, 2005.
The Security Aspect of Social Engineering Justin Steele.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Proxy Servers & Firewalls. What is proxy ? What is proxy ? Main purpose of using proxies Main purpose of using proxies How a proxy works ? How a proxy.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Firewalls Group 11Group 12 Bryan Chapman Richard Dillard Rohan Bansal Huang Chen Peijie Shen.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Cisco Router Technology. Overview Topics :- Overview of cisco Overview of cisco Introduction of Router Introduction of Router How Router Works How Router.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Chapter 26: Network Security Dr. Wayne Summers Department of Computer Science Columbus State University
XenClient Enterprise 4.5 Engine Network Addressing Modes.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Firewalls. A Firewall is: a) Device that interconnects two networks b) Network device that regulates the access to an internal network c) Program that.
Defining Network Infrastructure and Network Security Lesson 8.
Networking Objectives Recap and understand the following network addressing terms – IP address – MAC address – Packet – protocol.
CompTIA Network+ Certification Exam
Network and System Security Risk Assessment
TECH TIP – Videoconferencing settings for Apple AirPort Extreme wireless access point. SYMPTOM / ISSUE After connecting a set-top videoconferencing system.
An Introduction To ARP Spoofing & Other Attacks
Section 4 – Computer Networks
Connecting Network Components
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Computers
Chapter 2: Basic Switching Concepts and Configuration
CompTIA Network+ Certification Exam
Chapter 12 Communications Security & Countermeasures
Chapter 26: Network Security
Access Control Lists CCNA 2 v3 – Module 11
Firewalls Purpose of a Firewall Characteristic of a firewall
תרגול 11 – אבטחה ברמת ה-IP – IPsec
Firewalls By conventional definition, a firewall is a partition made
AbbottLink™ - IP Address Overview
IST346: Networking Fundamentals
GCSE ICT Setting up a Network.
GCSE ICT Setting up a Network.
Firewall Installation
Computer Networks ARP and RARP
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

A brief Description of the University Network By John G. mwangi Senior Network Administrator Jomo Kenyatta University of Agriculture and Technology

Proxy Public Switch MDU Firewall Route r Databas e q.M ail SERVERS Internet

Firewall I can check the top users from the firewall in terms of: The IP address The website Protocol

Firewall continued Helps in content filtering. Acts as my default gateway Blocking websites that are consuming bandwidth,p2p traffic video and audio streaming Security-sends regular updates on who is messing the network 07/24/ :55: SYN flood attack dropped - Source: , Destination: , /24/ :55: ICMP packet dropped - Source: , 3, WAN - Destination: , 3, WAN - Dest Unreachable, Code: /24/ :55: IP spoof dropped - Source: , 137, LAN - Destination: , 137, DMZ - MAC address: EC.02.EC.1A - 07/24/ :55: ARP timeout - Source: Destination: /24/ :55: TCP FIN packet dropped - Source: , 39813, WAN - Destination: , 1335, WAN /24/ :56: ICMP packet dropped - Source: , 3, WAN - Destination: , 3, WAN - Dest Unreachable, Code: 3 type=3 code=3 - 07/24/ :56: Out-of-order command packet dropped - Source: , 21, WAN - Destination: , 1620, LAN - -

Public switch This contains equipment with public IP addresses, mail, proxy server I have done NAT with my private IP Addresses. The wireless network is also connected in this switch. Outside my LAN, ubiquiti equipment nanstation2

Proxy server Runs fedora 8.0 squid Caching keep local copies of frequently requested resources Content filtering Ntop installed To keep machines behind it anonymous

MDF/MDU Where all the university fibre network is terminated Has got our core switch 25 fibre terminations(with media converters) from different buildings, engineering, computer science,adminstration,library. Mixture of both single mode and multimode fibre cables

MDF Fibre Departmental switch Staff Members Child proxy server CAT5 or 6 UTP Students Lab switch

Thank you