Local configuration global effect

Slides:



Advertisements
Similar presentations
Interconnection Networks: Flow Control and Microarchitecture.
Advertisements

MAP-3100 / MAP a/b/g Indoor MESH Access Point Copyright © PLANET Technology Corporation. All rights reserved.
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts – Chapter.
Module 10: Routing Fundamentals and Subnets Small Router Purchase Subnetting Example a Basic Subnetting b Subnetting a Class A Network.
Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless Service Implementation.
E-commerce security by Asif Dalwai Introduction E-commerce applications Threats in e-commerce applications Measures to handle threats Incorporate.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
Networking with Windows Vista.. Vista’s New Tools and Features The Network and Sharing Center Network Discovery Network Map Network Diagnostics.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Constructing a Network Addressing Scheme.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Connecting LANs, Backbone Networks, and Virtual LANs
DrayTek VPN Solution. Outline What is VPN What does VPN Do Supported VPN Protocol How Many Tunnels does Vigor Support VPN Application Special VPN Application.
Session 6 Windows Platform Dina Alkhoudari. Learning Objectives What is Active Directory Logical components of active directory Physical components of.
Day15 IP Space/Setup. IP Suite of protocols –TCP –UDP –ICMP –GRE… Gives us many benefits –Routing of packets over internet –Fragmentation/Reassembly of.
Presentation Title Subtitle Author Copyright © 2002 OPNET Technologies, Inc. TM Introduction to IP and Routing.
CISCO NETWORKING ACADEMY Chabot College ELEC IP Routing Protocol Highlights.
LTEC 4560 Summer 2012 Justin Kappel Networking Components.
IPv6 Home Networking Architecture - update IETF homenet WG Interim meeting Philadelphia, 6 th Oct 2011 draft-chown-homenet-arch-00.
Module 7: Implementing Sites to Manage Active Directory Replication.
Introduction to Dynamic Routing Protocol
Dynamic routing Computer networks in practice ÓBUDAI EGYETEM 2011 TAVASZI FÉLÉV 8. LABORGYAKORLAT PRÉM DÁNIEL.
Virtual Networking. Module Objectives By the end of this module participants will be able to: Understand the use of virtual LANs Create VLAN subinterfaces.
Chapter 8: Virtual LAN (VLAN)
Module 6: Implementing Group Policy. Overview Implementing Group Policy Objects Implementing GPOs in a Domain Managing the Deployment of Group Policy.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Part of slides provided by J.F Kurose and K.W. Ross, All Rights Reserved Network Security7-1 Chapter 7 Network Security Extra Slides Communication Networks.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
CCNP Network Route IPV-6 Part-I IPV6 Addressing: IPV-4 is 32-BIT, IPV-6 is 128-BIT IPV-6 are divided into 8 groups. Each is 4 Hex characters. Each group.
Institute of Technology Sligo - Dept of Computing Sem 2 Chapter 12 Routing Protocols.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Lesson 2 – IP Addressing IP Address (IPv4 – Version 4) Private and Public Address Brief Introduction to IPv6 – Version 6.
Basic Routing Principles V1.2. Objectives Understand the function of router Know the basic conception in routing Know the working principle of router.
Module 11: Designing Security for Network Perimeters.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
Data and Computer Communications Chapter 10 – Circuit Switching and Packet Switching.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—2-1 Implementing an EIGRP-Based Solution Lab 2-2 Debrief.
11 DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE Chapter 7.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Access Control Lists.
Sem 2 v2 Chapter 12: Routing. Routers can be configured to use one or more IP routing protocols. Two of these IP routing protocols are RIP and IGRP. After.
Static Routing CCNA Routing and Switching Semester 2 Chapter 6
IT 242 Week 6 CheckPoint Static or Dynamic To purchase this material link CheckPoint-Static-or-Dynamic.
IT 244 Week 8 DQ 3 To purchase this material link 244-Week-8-DQ-3 For more courses visit our website
Configuration for routing example
Barracuda NG Firewall ™
Lec4: Introduction to Dynamic Routing Protocol
Accessing the WAN – Chapter 5
15-744: Computer Networking
Virtual Local Area Networks or VLANs
Routing and Routing Protocols: Routing Static
Planning the Addressing Structure
Chapter 4 Data Link Layer Switching
6.829 Lecture 13: Software Defined Networking
CCNA 2 v3.1 Module 6 Routing and Routing Protocols
Virtual LANs.
Introduction to Internet Routing
Introduction to Dynamic Routing Protocol
Routing and Routing Protocols: Routing Static
Introduction to Dynamic Routing Protocol
Adaptive Flow Control using OpenFlow
After 3.2 Revised
Survivable Real-Time Network Services (G409/J175)
This presentation uses a free template provided by FPPT.com Computer Support and Services in Connecticut
Configuring Subnetting
-.&- ·Af& Q 0 "i'/
Module 8: Implementing Group Policy
OSPF Protocol.
Presentation transcript:

Local configuration global effect A company has two locations: A and B Both A and B have front offices and data centers Security policy: front office computers can talk to front office computers and its own data centers, but not other office’s data center; data center computers can talk to each other.

Local configuration global effect Security policy implementation Drop all packets From BF subnet Drop all packets From AF subnet

Local configuration global effect The two datacenter wants to be the backup of each other, add a link. What happen next? Drop all packets From BF subnet Drop all packets From AF subnet

Local configuration global effect The security policy is broken: it requires routing and packet filtering to work in concert; but the routing automatically adapts to topology change. Much nicer to use global network view to do the function Drop all packets From BF subnet Drop all packets From AF subnet