Presentation is loading. Please wait.

Presentation is loading. Please wait.

LECTURE16 NET 301. HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the key considerations are:

Similar presentations


Presentation on theme: "LECTURE16 NET 301. HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the key considerations are:"— Presentation transcript:

1 LECTURE16 NET 301

2 HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the key considerations are: How many wired Ethernet ports, if any, will you need? Where will these Ethernet ports need to be located? (In other words, where will the PCs and other equipment that will be plugged into these Ethernet ports be located?) Where will the router and high-speed modems be located? Answering these questions will help you understand what types of equipment you need, as well as how much cable you’ll need.

3 Step 2: Determine Where To Put Your Equipment Before you begin any installation, commit to the location for each piece of equipment in your network. This is critical if you’re going to run raw Cat 5 cable beneath drywall or over a ceiling, because you won’t be able to change the cable lengths if something goes wrong. In the case of a moderate-sized space–such as the Ergo office–it will be helpful to sketch the locations of each node on your network. Here are the physical locations of Ergo’s ports and other equipment: Cable modem and wired/wireless router in the back of the office. Two two-port Ethernet wall sockets downstairs, one socket in the back of the office and one socket in the front.

4 Step 3: Gather Your Tools And Supplies Ethernet Cable.. Cable Connectors.. Crimper.. Cable/DSL Modem. Wired/Wi-Fi Router Ethernet Hub

5 Step 4: Run The Cables In this step, we’ll create the “cable runs” that will establish wired connections between the Ethernet ports on the ground floor and the router and cable modem upstairs. Run cable from the router and cable/DSL modem location to the area where each Ethernet port will be located. As you run the cable to these locations, make sure you temporarily affix the Cat 5 to the wall or floor so that you have a realistic idea of how much cable you’ll need. Also: Leave yourself five or 10 extra feet at the end of the cable, just in case.

6 Step 5: Crimp The Cables Step 6: Connect All The Cables Together Step 7: Test Your Network Connection Step 8: Set Up Your Router

7 Step 9: How to Protect Your Network In general, these are the security settings you should make or adjust: Change the SSID of your router. Use a name that’s innocuous and doesn’t refer to your business. Disable your wireless router’s “SSID Broadcast setting.” This will prevent random snoopers from seeing or detecting your Wi-Fi network through ordinary means. Set up either 128-bit WEP encryption or Windows WPA encryption. This is a fairly easy process that varies depending on your router’s software. Enable the firewall on your wireless router

8 APPLICATIONS Applications on a LAN can range from word processing to data base management systems. The most universally used application is E-mail. E-mail software provides a user interface to help construct the mail message and an engine to move the E-mail to its destination. Depending on the address, the E-mail may be routed across the office via the LAN or across the country via LAN/WAN bridges and gateways. E-mail may also be sent to other mail systems, both mainframe- and PC-based. An important security note is that on some systems it is also possible to restrict mail users from attaching files as a part of an antivirus program. Many application systems have their own set of security features, in addition to the protection provided by the network operating system. Data base management systems, in particular, have comprehensive security controls built in to limit access to authorized users.

9 NETWORK MANAGEMENT The overall management of a LANis highly technical. The ISO’s network management model divides network management functions into five subsystems: Fault Management, Performance Management, Configuration Management, Accounting Management, and Security Management. Security management includes controlling access to network resources.

10 NETWORK MANAGEMENT Network management products, such as monitors, network analyzers, and integrated management systems, provide various network status and event history data. These and similar products are designed for troubleshooting and performance evaluation, but can also provide useful information, patterns, and trends for security purposes. For example, a typical LAN analyzer can help the technical staff troubleshoot LAN bugs, monitor network traffic, analyze network protocols, capture data packets for analysis, and assist with LAN expansion and planning.

11 ACCESS CONTROL MECHANISMS Network operating systems have access control mechanisms that are crucial for LAN security. For example, access controls can limit who can log on, what resources will be available, what each user can do with these resources, and when and from where access is available. Management, LAN, security, and key user personnel should cooperate closely to implement access controls.

12 THREATS TO LAN SECURITY People Threats.. Costly System administration error Software/programming error (bugs) Unauthorized disclosure, Unauthorized use Modification of data Theft of computer assets Alteration of software Hardware failure ( or any physical )

13 http://www.acsa- admin.org/secshelf/book001/16.pdf


Download ppt "LECTURE16 NET 301. HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the key considerations are:"

Similar presentations


Ads by Google