Presentation is loading. Please wait.

Presentation is loading. Please wait.

Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID 08051602 Module code:CT3P50N BSc Computer Networking London Metropolitan University.

Similar presentations


Presentation on theme: "Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID 08051602 Module code:CT3P50N BSc Computer Networking London Metropolitan University."— Presentation transcript:

1 Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID 08051602 Module code:CT3P50N BSc Computer Networking London Metropolitan University 03/02/12 Supervisor: Dr. Shahram Salekzamankhani

2  LAN : A group of computers and devices interconnected together in a limited geographical area such as computer laboratory, etc to enable the sharing of resources like printers, files, amongst users.  LAN security provides confidentiality, data Integrity, and availability to network users. ( Protection: information, systems, hardware that store, and transmit information. )  OSI Model is used as a basis for a systematic approach to secure LAN Vulnerabilities.  A Virtual topology is used to show how to have a secured wired LAN solution. Introduction

3 LAN Security?  Network security solutions started coming up as the early 1960 but didn’t have a big impact not until the 2000s.  Last 13 years measures to mitigate LAN security threats and cryptography security technology(encryption and hashing mechanisms) been developed. Categories of Network threats  Reconnaissance attacks  Packet sniffers,  Ping sweeps,  Port Scans,  Internet information queries,  Denial-of-service  Ping of Death,  Smurf Attack,  TCP SYN Flood attack  Worm.  Virus,  Trojan horse, Project background

4  Access attacks  Man-in-the-middle,  Buffer overflow,  Port Redirection,  Password attacks,  Trust exploitation  Other categories that exploit LAN switches vulnerabilities.  MAC address spoofing,  Spanning Tree Protocol manipulation attack,  MAC address table overflows,  LAN storms,  VLAN attacks, Cont : Project background

5  Aims 1: To investigate which OSI model layer is most vulnerable to attacks. 2: To investigate, analyse the available tools and methods to secure a wired LAN.  Objectives  To secure the physical layer devices i.e. Routers, Switches, PCs, servers, etc.  To secure layer 2 protocols i.e. Ethernet/IEEE 802.3, token ring / IEEE 802.5.  To secure the addressing structure and routing protocols at the network layer.  To have a secure and reliable transport mechanism between two communicating devices.  To provide a secure way for applications to translate data formats, encrypt and decryption of the data using authentication methods, SSH, passwords, encryption etc. Aims and objectives

6  Cont: Objectives  To provide a secure platform for users to interact with applications by securing application layer protocols such as HTTP, FTP, TELNET, FTP-DATA.  To prevent un-trusted traffic to access the network resources.  To provide a cost effective but efficient and reliable LAN.  Personal and Academic objectives  To learn how to secure LAN.  To learn to organise my time meaningfully to meet deadlines.  To learn research technique and writing well-structured report.  To improve my presentation skills, confidence,and prepare for a career in Computer and Network Security. Aims and objectives

7 Scenario: Secured LAN Topology

8 Developments  End users Host- Based Intrusion Detection Systems(London Met labs) Cisco catalyst Switches  Message of the day / login Banner  Port level Port Security  BPDU Guard  Storm Control  Root Guard  High Availability with Hot Standby Routing Protocol (HSRP)  VLANs  VLAN Trunk Security  Root Bridge  Spanning Tree Protocol feature – PortFast

9 Cont: Developments Cisco Router security  Password requirement (router access).  Secure remote routers access.  Secure unused router network services & interfaces.  Authentication, Authorization, Accounting protocol.  Syslog server – LAN activities.  IPS software firewall.  Secure EIGRP routing protocol authentication Secure router IOS image  Access Lists  Network Address Translation/PAT

10 Analysis Inspection rule/Audit-trail process CBAC rule Secure DHCP server: DHCP Snooping, Dynamic ARP inspection, IP source guard

11 Cont: Analysis Public users access internal web server Public denied access to private VLAN 2, and 3 subnets

12 Cont: Analysis Inter- VLAN routing : VLAN 2 accesses VLAN 3 & DMZ VLAN 3 accesses VLAN 2 & DMZ

13 Cont: Analysis ISP/WEB server pings successfully the Company DMZ Web server NAT Transactions

14 Cont: Analysis In-line IPS software firewall inspection Syslog server activity

15 Cont: Analysis Secure line VTY: SSHVlan 2 & 3 access internet

16  London Met Cisco laboratory enabled me achieve a secured environment of the physical layer devices.  layer 2 is the LAN’s most vulnerable layer  Secured layer 2 to 7 of the OSI model layers.  Secured the private network from receiving un-trusted traffic from public network/internet.  LANs redundancy, reliability and cost effectiveness achieved by;  Implement Network Security Policies & employ Network Security Professionals.  Skills learnt: LAN security threats,& mitigation technology, Time management, report writing, information research and presentation skills. Conclusion

17


Download ppt "Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID 08051602 Module code:CT3P50N BSc Computer Networking London Metropolitan University."

Similar presentations


Ads by Google