Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study

Slides:



Advertisements
Similar presentations
Communication Networks Recitation 3 Bridges & Spanning trees.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Presented by Serge Kpan LTEC Network Systems Administration 1.
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
1 Chapter 8 Local Area Networks - Internetworking.
Computer Networks Eyad Husni Elshami. Computer Network A computer network is a group of interconnected computers to share data resources ( printer, data.
Course 301 – Secured Network Deployment and IPSec VPN
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Connecting LANs, Backbone Networks, and Virtual LANs
Networking Components Christopher Biles LTEC Assignment 3.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
COEN 252 Computer Forensics
Semester 3, v Chapter 3: Virtual LANs
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Common Devices Used In Computer Networks
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Chapter 8: Virtual LAN (VLAN)
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Chapter 6 – Connectivity Devices
Chapter 2 Network Topology
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Chapter Overview Bridging Switching Routing.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
LAN Devices  Purposes: Dividing the network into subnets Dividing the network into subnets Joining two networks together Joining two networks together.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Security fundamentals Topic 10 Securing the network perimeter.
NETWORK COMPONENTS BY REYNALDO ZAMORA. HUB Hubs are devices that serve as the central connection for a network. Its job is to send data from one computer.
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
Ch. 15 Connecting LANs.
NETWORK DEVICES Department of CE/IT.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Networking Devices.
Planning and Troubleshooting Routing and Switching
Computer Data Security & Privacy
Virtual LANs.
CompTIA Security+ Study Guide (SY0-401)
2018 Real CompTIA N Exam Questions Killtest
* Essential Network Security Book Slides.
Firewalls Routers, Switches, Hubs VPNs
Chapter 3 VLANs Chaffee County Academy
AbbottLink™ - IP Address Overview
Presentation transcript:

Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study prac/designing-secure-local-area-network_853

Introduction In order to design and build a well-secured network many factors must be taken into consideration 1.Network topology and placement of hosts within the network 2.The selection of hardware and software technologies 3.The careful configuration of each component. 4.the issues in designing a secure Local Area Network (LAN) and some of the best

Introduction Securing a LAN network should take care of 1.Securing the network topology which comprises the physical and logical design of the network; 2.securing the routers and switches which connect segments and hosts to form the network

Secure LAN Design Challenges 1.Securing the network from Internet launched attacks 2.Securing Internet facing web, DNS and mail servers 3.Containing damage from compromised systems, and preventing internally launched attacks 4.Securing sensitive and mission critical internal resources such financial records, customer databases, trade secrets, etc. 5.Building a framework for administrators to securely manage the network 6.Providing systems for logging and intrusion detection

Case study we wish to secure a small to medium sized (under 500 hosts) TCP/IP based LAN which is connected to the Internet via broadband or other high speed connection. We need for a reasonable amount of security because of mission critical records or proprietary information. IT352 | Network Security |Najwa AlGhamdi5

Topology and Architecture Topology is the physical and logical layout of the network. On the physical side, we will need to 1. provide distribution to the offices or buildings where the users are located. 2. We will need to provide connectivity to the servers which comprise our intranet, to the Internet, and possibly to other company locations or business partners, remote users connecting via telephone lines, etc. IT352 | Network Security |Najwa AlGhamdi6

Topology and Architecture The logical topology :technologies in how data is transferred in physical topology such (VLANs) and (VPNs). In laying out the logical topology we will need to 1. Decide what parts of the network are less trusted, and which are more? 2.Which groups of devices and users should be logically grouped together, and which should be separated? IT352 | Network Security |Najwa AlGhamdi7

Initial network design

border router is a router that is usually deployed in front of the organization's main firewalls It performs some basic checks on network activity may be helpful in stopping some Internet-based worms from reaching the organization's firewall.

Initial network design An extranet is a computer network that allows controlled access from the outside, for specific business or educational purposes. its as an extension of an organization's intranet that is extended to users outside the organization, usually partners, vendors, and suppliers, in isolation from all other Internet users.

Initial network design A core router designed to operate in the Internet backbone, or core. A Layer 3 switch is a high- performance device for network routing. Layer 3 switches actually differ very little from routers. It can support the same routing protocols as network routers do. Both inspect incoming packets and make dynamic routing decisions based on the source and destination addresses inside.

Initial Network Design The basic design illustrates connection to the Internet with a border router and firewall, and our public extranet servers which are connected to a third interface on the firewall. The firewall is one of four connections to a core router Or layer 3 switch. The remaining connections to core router are the floor or building switches which provide connectivity to the different departments and our intranet servers.

Initial Network Design This topology demonstrates how devices with similar functions and security profiles are grouped together – the public extranet servers, user workstations, and the intranet servers. By creating separate security zones, we will be able to enforce security policy with the appropriate firewall rules and layer 3 access lists. This design lacks is the infrastructure for managing network. These servers will form the foundation of our network management and security, a separate management VLAN which is isolated from the rest of the network by a firewall will be created. If this is not possible because of physical or other limitations, management should be encrypted via IPSEC.

Initial Network Design + IT352 | Network Security |Najwa AlGhamdi14 Management VLAN LAN

Securing Routers and Switches The design calls for segmenting the network into subnets based on function and, possibly, location. Subnetting By implementing routing at the at the network core, our segments are isolated into individual broadcast domains. This improves performance and also improves security by preventing attackers from altering routing and man in the middle attack.

Securing Routers and Switches Within each subnet the hosts are connected to an Ethernet switch. A switch provides high performance and enhances security by making sniffing attacks difficult. A hub is a less expensive alternative to a switch for layer 2 connectivity, though it is less desirable both from a performance and a security standpoint IT352 | Network Security |Najwa AlGhamdi16

Layer3 Design and Access list + IT352 | Network Security |Najwa AlGhamdi17 Management VLAN LAN

Layer 3 Design and Access Lists layer 3 design is quite simple, with a central core router connecting the different production and management networks. In core router, the access lists is implemented as a follows 1.For inbound traffic coming into a subnet, we will permit only appropriate incoming packets coming from certin IP addresses. 2.For outbound traffic : traffic is filtered to eliminate spoofing and minimize any malicious or illegitimate activities.

Layer 3 Design and Access Lists

Example : we will want to filter traffic leaving each subnet to prevent spoofing. The presence of incorrect source addresses could indicate either a misconfigured machine, or an attempt to launch a DOS or similar attacks. IT352 | Network Security |Najwa AlGhamdi20

Layer2 Design + IT352 | Network Security |Najwa AlGhamdi21 Management VLAN LAN

Layer2 Secure Design Main goal : to maximize the security of the switch ports themselves. Since the switch ports are the gateway into our network, we will want to implement physical security when possible, by controlling access to switch ports, and disabling unused ports. IT352 | Network Security |Najwa AlGhamdi22

Layer2 Secure Design Spanning-Tree Protocol (STP) is used by switches and bridges to establish their 1.MAC address forwarding tables (table of all MAC addresses traversing the switch) 2.and establish a tree-like topology which forwards frames via the fastest path and eliminates loops. Bridge Port Data Units (BPDUs) are exchanged by switches to share information about the topology. If our switch supports STP, prevent random hosts is prevented from either forwarding BPDUs or affecting the spanning tree. IT352 | Network Security |Najwa AlGhamdi23

Advanced Technology Intrusion Detection Systems (IDS) Many experts would include IDS as part of the essential elements of securing any network. Network IDS can alert the system administrator to attacks on the network in real time by 1. inspecting the traffic on the wire 2. and generating alerts if suspicious activities are identified IT352 | Network Security |Najwa AlGhamdi24

Advanced Technology Intrusion Detection Systems (IDS) NIDS can be a 1.Regular computer running IDS software 2.Appliance type device running exclusive software 3.or even a specialized card built in to a switch or other Once we have selected a NIDS for use in our network, we will need to place the sensors logically within the topology. IT352 | Network Security |Najwa AlGhamdi25

Advanced Technology IT352 | Network Security |Najwa AlGhamdi26

Advanced Technology Suggest a technology to enhance security here. IT352 | Network Security |Najwa AlGhamdi27