1 / 12

Network Topology

Network Topology. The WAN. Cisco 2921 Integrated Services Router. Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with Group Encrypted Transport VPN, Dynamic Multipoint VPN, or Enhanced Easy VPN

chiko
Download Presentation

Network Topology

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Topology

  2. The WAN Cisco 2921 Integrated Services Router • Security Embedded hardware-accelerated VPN encryption • Secure collaborative communications with Group Encrypted Transport VPN, Dynamic Multipoint VPN, or Enhanced Easy VPN • Integrated threat control using Cisco IOS Firewall Cisco IOS Zone-Based Firewall, Cisco IOS IPS, and Cisco IOS Content Filtering • Identity management: Intelligently protecting endpoints using authentication, authorization, and accounting (AAA), and public key infrastructure

  3. Beyond Our Network With Private IP Enhanced Traffic Management, our Private IP Layer 3 MPLS-based VPN puts all your traffic on a reliable, private network with Quality of Service (QoS) routing. And with Private IP Layer 3, you can build a hybrid solution between your public and private networks while enabling automated business processes, including e-commerce, VoIP, converged solutions, shared intranets, and extranets. Advanced Technology Whether you outsource service to us or manage it yourself, our Cisco-powered, private, MPLS network meets your enterprise's rigorous demands, including: Global availability - over 121 countries/territories QoS routing Enhanced Visibility & Network Management Solutions Multicasting for improved bandwidth conservation Seamless Frame Relay/ATM integration Stringent SLAs Remote access (via Secure Gateway) Multiple access options including DSL, satellite, and Ethernet Any-to-any connectivity Streamlines network management, planning, and expansion. Six IP Classes of Service (CoS) Six Classes of Service (CoS) let you prioritize traffic (voice, video, data) while consolidating your traffic on a single network. This offers you additional flexibility that lets you dictate how traffic is handled across the network, giving priority to mission critical traffic.

  4. ITSY 2300 Hardening the Windows host

  5. Windows Firewall • Microsoft Windows operating systems and related applications such as Internet Explorer contain thousands of security-related software flaws that can be exploited by malicious programs. • A fraction of those errors have been discovered, fewer have been repaired by Microsoft (in the form of “patches”). • Average loss to Fortune 500 companies is $2M per worm

  6. Windows Firewall • Windows Firewall is installed and enabled by default for all dial-up, network, IEEE 1394 (FireWire), and wireless connections on a computer • Windows Firewall does not control outgoing connections unless Advanced Security controls are used. Because of this, Windows Firewall allows any program running on your computer to connect to the network.

  7. Windows Firewall • General Configures general firewall settings, including whether the firewall is turned on and whether all programs are blocked when connected to public networks in less. • Advanced  Configures protected connections, security logging, and allowed types of control messages. • Configuring Security Logging When logging is enabled, the security log is created as a standard text file and stored in the %System-Root%\ folder as pfirewall.log.

  8. Demilitarized Zone (DMZ) What is it and why is a DMZ used? Benefits vs Drawbacks How is it implemented?

  9. Accessing the DMZ Servers Internal User Accessing Web Server in DMZ External User Accessing Web Server in DMZ • Internal client requests web page • Packet is routed out firewall to ISP DNS • Packet enters back through firewall to DMZ • External user requests web page • Firewall checks packet for source and destination • Packet is sent to the Web Server in the DMZ

  10. Intrusion Prevention System

More Related