1 / 8

Joe and Sally’s Toys

Joe and Sally’s Toys.

dolph
Download Presentation

Joe and Sally’s Toys

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Joe and Sally’s Toys Joe and Sally’s Toys is a privately held company, was started in 1999 in Dallas, Tx. The company designs and manufactures award-winning kids toy systems which combines technology with aluminum and plastic construction. The goal of the company is to deliver a high quality play experience that families will play with for generations.

  2. This company has called on our team to design and implement a network that would do the following: • Increase the overall security posture of the network • Functionality without affecting overall network performance • QoS = Security

  3. Pix Router configuration

  4. CISCO IOS ROUTER HARDWARE-BASED FIREWALL WITH NAT Router Configuration -Two Interface router -NAT or PAT Configuration -Extended Access List -DNS, SMTP Web services provided remotely or from ISP

  5. What makes this a firewall “Definition- An application or device that selectively discriminates against network traffic flowing into or out of an organization network.” *What makes this router a fire-wall? “Answer” Content Based Control List CBAC Key Features -Protocols traffic Inspection -Session traffic Inspection -Inspects traffic up to the application layer -Keeps a state of the connection in memory -Session timers

  6. Check Point End point Security

  7. West Network Configuration • Check Point Endpoint Security uses a Stateful packet inspection for all traffic on our network. • The centrally managed interface on the server allows the members of IT to update the malware definitions and the OS updates, setup the VPN access, Encrypt disk contents and monitor the firewall logs. • The Endpoint security is in all in one product that allows us to protect all our resources and provide one mode of access, meaning just a username and password is needed to access all user functions as opposed to multiple logins for a system with multiple security programs. • Webcheck allows questionable websites to be displayed for what they are because a window will popup identifying them, so the user can exit the site. • Program Control has Program advisor which has a database of millions of legitimate programs and malicious ones too, to give IT more control over what programs are allowed on the client systems. • All of the Security is transparent to our users. • Checkpoint offers 24/7 support of the product with locations around the Globe.

More Related