Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Security Principles & Practices By Saadat Malik Cisco Press 2003.

Similar presentations


Presentation on theme: "Network Security Principles & Practices By Saadat Malik Cisco Press 2003."— Presentation transcript:

1 Network Security Principles & Practices By Saadat Malik Cisco Press 2003

2 Network Security2 – Chapter 2 – Defining Security Zones What are security zones? DMZ Cisco PIX firewalls

3 Network Security3 Network Architecture The topological design of a network is one of the best defenses against network attacks. Using zones to segregate various areas of the network from each other. Different zones of the same network have different security needs. Better scalability

4 Network Security4 Zoning strategies 1.Greater security needs, more secure zones 2.Controlled access to zones 3.Publicly accessed servers are placed in separate zones from private servers. 4.To achieve highest security, each server is placed in a separate zone. Why? 5.The ‘defense in depth principle’ - Firewalls are used to separate the zones.

5 Network Security5 DMZ Different ways of creating demilitarized zones: 1.Using a 3-legged firewall 2.Placing the DMZ outside the firewall ‘Bastion hosts’ are placed in the DMZ. a)In the path between a firewall and the Internet b)Dirty DMZ Rationale ? 3.Placing the DMZ between stacked firewalls

6 Network Security6 Cisco PIX Firewall Multiple interfaces, each with its own security level (lowest 0.. 100 highest) May support multiple security zones, thus allowing multiple DMZs to be set up In general, a computer/device in a lower security zone cannot access computer/device in a higher security zone, unless a ‘hole’ is created. Each security zone should have a unique number.

7 Network Security7 Cisco PIX Firewall Example configuration: –nameif ethernet0 outside security0 –nameif ethernet1 inside security100 –nameif ethernet2 dmz security50


Download ppt "Network Security Principles & Practices By Saadat Malik Cisco Press 2003."

Similar presentations


Ads by Google