Sample Diagram.

Slides:



Advertisements
Similar presentations
Agenda Benefits of Campus LAN Other Benefits Survey Prerequisities
Advertisements

Overview of Network Management Network Architecture Fault tolerance and Alerts Data Security Performance, SLA Service Provisioning Accounting and Cost.
Integration of PAP site 17 th July 10. Requirements of PAP SITE  Bandwidth drop  Router  RJ45 cables  Switch  Gateway  Nodes  Ups  9urack.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
IS Network and Telecommunications Risks
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Virtual Private Network
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Uday O. Ali Pabrai, CISSP, CHSS Chief executive, HIPAA Academy Health care & HIPAA Security Remediation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter Overview Network Communications.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
Application Overview. Network Zone User Zone – Client Layers.
 Computer Networking Computer Networking  Networking terminology Networking terminology  Client Server Model Client Server Model  Types of Networks.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Exploring the Network.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
Washington School District Project. General Requirements: Functional =7-10 Years 100X Growth in LAN 2X Growth in WAN 10X Growth in Internet Connectivity.
Lincoln Nebraska & France Tai’s Part. Lincoln Nebraska Expansion 175 Computers 175 VOIP Phones T3 Point-to-Point to Data Center OC3 to the Internet 2.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
Computer networks Internet, Intranet, Extranet, Lan, Wan, characteristics and differences.
Security fundamentals Topic 10 Securing the network perimeter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 VLANs LAN Switching and Wireless – Chapter 3.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson National Accelerator Facility Mike Memory.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Copyright 2013 FairPoint Communications Network safety and security – Protecting your communications resources Karen Romano, Vice President, Government.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Security fundamentals
Chapter 1: Explore the Network
Chapter 7. Identifying Assets and Activities to Be Protected
Chapter 1 Introduction to Networking
Chapter 1: Exploring the Network
Working at a Small-to-Medium Business or ISP – Chapter 8
LAN Switching and Wireless – Chapter 3
E-Commerce.
Basic Computer Networking at the Toolik Field Station
IS4550 Security Policies and Implementation
Unit 27: Network Operating Systems
LAN Switching and Wireless – Chapter 3
UNM Enterprise Firewall
PPPoE Internet Point to Point Protocol over Ethernet
Seminar Class CS591 Presentation Topic: VPN
Firewalls Routers, Switches, Hubs VPNs
LAN Switching and Wireless – Chapter 3
Chapter 10: Advanced Cisco Adaptive Security Appliance
LAN Switching and Wireless – Chapter 3
Instructor Materials Chapter 8: Applied Networking
Chapter 1.1: Internetworking
Global One Communications
Presentation transcript:

Sample Diagram

VPN to Municipalities via Internet See Figure C-1-D in CJIS Policy (Dedicated Circuits) VPN to Municipalities via Internet See Figure C-1-D in CJIS Policy Other Municipalities WWW CSA Remote Admin? Other Relationships: Fiber to other Facilities SAN Storage (CJI ?) Regional Provider (CSA approved) Internet Router Intrusion Detection Extranet Router/Firewall/VPN AA Server CAD System (CJI) 128-bit TLS Make/Model/Version (IOS) of Routers? Make/Model/Version (software) of Firewalls? Type of AA (Advanced Authentication) in use? IDS? NIDS/HIDS? FIPS 140-2 Certificates for all traffic outside of the physically controlled areas? All LE traffic separated by VLANs/Firewalls from other Non LE traffic? LE VLANs Non-LE VLAN (see following slide) CAD Client w/AA TLS Web App. hosted by State with AA See following slide for more examples Other Department workstations/Local 802.11X LAN CAD Clients TLS Web App. hosted by State

What we would like to see

VPN to Municipalities via Internet (See Figure C-1-D in CJIS Policy) (Dedicated Circuits) VPN to Municipalities via Internet (See Figure C-1-D in CJIS Policy) Other Municipalities WWW CSA Remote Admin? Other Relationships: Fiber to other Facilities SAN Storage (CJI ?) Regional Provider (CSA approved) CISCO 2800 IOS v6.1 IBM Proventia CISCO 2800/v6.1 CISCO ASA 5505 AA Server (RSA) RMS System (CJI) TriTech Perform Netmotion Mobility XE CAD System (CJI) Tritech Perform 128-bit TLS Make/Model/Version (IOS) of Routers? Make/Model/Version (software) of Firewalls? AV? Patching? Type of AA (Advanced Authentication) in use? IDS? NIDS/HIDS? FIPS 140-2 Certificates for all traffic outside of the physically controlled areas? All LE traffic separated by VLANs/Firewalls from other Non LE traffic? Personally Owned Devices? RMS and CAD? LE VLANs Non-LE VLAN (see following slide) CAD Client w/AA (RSA) TLS Web App. hosted by State with AA See following slide for more examples Other Department workstations/Local 802.11X LAN (if 802.11X used for CJI see CJIS Policy 5.5.7) CAD Clients TLS Web App. hosted by State (Name of State System)

VLANS 5.5.7.1 All 802.11x Wireless Protocols Segregate, virtually (e.g. virtual local area network (VLAN) and ACLs) or physically (e.g. firewalls), the wireless network from the operational wired infrastructure. Limit access between wireless networks and the wired network to only operational needs. 5.10.1.4 Voice over Internet Protocol VoIP can be installed in-line with an organization’s existing Internet Protocol (IP) services. Among VoIP’s risks that have to be considered carefully are: myriad security concerns, cost issues associated with new networking hardware requirements, and overarching quality of service (QoS) factors. In addition to the security controls described in this document, the following additional controls shall be implemented when an agency deploys VoIP within a network that contains unencrypted CJI: 1. Establish usage restrictions and implementation guidance for VoIP technologies. 2. Change the default administrative password on the IP phones and VoIP switches. 3. Utilize Virtual Local Area Network (VLAN) technology to segment VoIP traffic from data traffic.

VLANs Segregate, virtually (e.g. virtual local area network (VLAN) and ACLs) or physically (e.g. firewalls), the wireless network from the operational wired infrastructure. Limit access between wireless networks and the wired network to only operational needs. Utilize Virtual Local Area Network (VLAN) technology to segment VoIP traffic from data traffic.

Mobility XE examples

Source: http://discover. netmotionwireless

Source: http://discover. netmotionwireless