Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

BellSouth ® Managed Network VPN Service Next-Generation Network Services for Todays Business Needs.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Module 5: Configuring Access for Remote Clients and Networks.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Remote Networking Architectures
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
1 Enabling Secure Internet Access with ISA Server.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
© 2007 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Knowledge Ventures. Subsidiaries and affiliates of AT&T.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Windows XP Home Networking Scott Manchester Technical Evangelist Home Networking.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Exploring the Network.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Your Business Challenges
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Firewall Security.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Security fundamentals Topic 10 Securing the network perimeter.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Cisco 2921/K9, Hot Required by Small to Enterprise Branch Offices.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
Cisco Discovery 3 Chapter 1 Networking in the Enterprise JEOPARDY.
Security fundamentals
Chapter 1: Explore the Network
Instructor Materials Chapter 1: Explore the Network
Chapter 1: Exploring the Network
Chapter 1: Explore the Network
Firewalls.
6.6 Firewalls Packet Filter (=filtering router)
Goals Introduce the Windows Server 2003 family of operating systems
VPN: Virtual Private Network
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Network Topology

Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with Group Encrypted Transport VPN, Dynamic Multipoint VPN, or Enhanced Easy VPN Integrated threat control using Cisco IOS Firewall Cisco IOS Zone-Based Firewall, Cisco IOS IPS, and Cisco IOS Content Filtering Identity management: Intelligently protecting endpoints using authentication, authorization, and accounting (AAA), and public key infrastructure

Beyond Our Network With Private IP Enhanced Traffic Management, our Private IP Layer 3 MPLS-based VPN puts all your traffic on a reliable, private network with Quality of Service (QoS) routing. And with Private IP Layer 3, you can build a hybrid solution between your public and private networks while enabling automated business processes, including e- commerce, VoIP, converged solutions, shared intranets, and extranets. Advanced Technology Whether you outsource service to us or manage it yourself, our Cisco-powered, private, MPLS network meets your enterprise's rigorous demands, including: Global availability - over 121 countries/territories QoS routing Enhanced Visibility & Network Management Solutions Multicasting for improved bandwidth conservation Seamless Frame Relay/ATM integration Stringent SLAs Remote access (via Secure Gateway) Multiple access options including DSL, satellite, and Ethernet Any-to-any connectivity Streamlines network management, planning, and expansion. Six IP Classes of Service (CoS) Six Classes of Service (CoS) let you prioritize traffic (voice, video, data) while consolidating your traffic on a single network. This offers you additional flexibility that lets you dictate how traffic is handled across the network, giving priority to mission critical traffic.

Hardening the Windows host

Windows Firewall Microsoft Windows operating systems and related applications such as Internet Explorer contain thousands of security-related software flaws that can be exploited by malicious programs. A fraction of those errors have been discovered, fewer have been repaired by Microsoft (in the form of “patches”). Average loss to Fortune 500 companies is $2M per worm

Windows Firewall Windows Firewall is installed and enabled by default for all dial-up, network, IEEE 1394 (FireWire), and wireless connections on a computer Windows Firewall does not control outgoing connections unless Advanced Security controls are used. Because of this, Windows Firewall allows any program running on your computer to connect to the network.

Windows Firewall General Configures general firewall settings, including whether the firewall is turned on and whether all programs are blocked when connected to public networks in less. Advanced Configures protected connections, security logging, and allowed types of control messages. Configuring Security Logging When logging is enabled, the security log is created as a standard text file and stored in the %System-Root%\ folder as pfirewall.log.

What is it and why is a DMZ used? Benefits vs Drawbacks How is it implemented?

Internal User Accessing Web Server in DMZExternal User Accessing Web Server in DMZ Internal client requests web page Packet is routed out firewall to ISP DNS Packet enters back through firewall to DMZ External user requests web page Firewall checks packet for source and destination Packet is sent to the Web Server in the DMZ Accessing the DMZ Servers

Intrusion Prevention System