Free Essay

Designing a Secure Network

In:

Submitted By medik
Words 3194
Pages 13
WAN Design with Frame Relay
David Horton CST-443 Abstract This paper gives a high-level overview of how to design a Wide Area Network (WAN) using Frame Relay technology. Aspects of the WAN design process are explored through the use of a fictitious manufacturing company called Zippy's Chips. The Zippy's WAN design covers the topics of weighing alternative technologies, setting up basic Frame Relay Permanent Virtual Circuit (PVC) connections, adding redundant links and scaling the network for future growth.

Table of Contents
Frame Relay in a Nutshell.......................................................................................................................... 2 Terminology.......................................................................................................................................... 2 Basic Concepts...................................................................................................................................... 2 A Sample Design...................................................................................................................................3 Deciding if Frame Relay is Right for the Network.................................................................................... 4 Advantages of Frame Relay...................................................................................................................4 Disadvantages of Frame Relay.............................................................................................................. 5 Alternatives to Frame Relay.................................................................................................................. 6 X.25.................................................................................................................................................. 6 ATM................................................................................................................................................. 6 Designing a Network with Frame Relay.................................................................................................... 6 Choosing the Topology......................................................................................................................... 7 Connecting the Sites.............................................................................................................................. 7 Basic Connectivity............................................................................................................................7 Redundant Links............................................................................................................................... 8 Negotiating the Provider Contracts..................................................................................................... 10 Choosing Equipment........................................................................................................................... 10 Scaling the Network with Frame Relay................................................................................................... 11 Alternative Topology............................................................................................................................... 12 Dual-hub Design..................................................................................................................................12 Co-location With Vend-O-Land..........................................................................................................13 Conclusion............................................................................................................................................... 14

WAN Design With Frame Relay David Horton

Page 2

Frame Relay in a Nutshell
Frame Relay is a layer-2 protocol used in wide area networking. It uses the telecommunications provider's packet-switching infrastructure to move data. Frame Relay can provide speeds from 56kbps DS0 up to 43Mbps DS3 connections depending on the capability of the service provider's network. [1]

Terminology
There are many terms used to describe Frame Relay, and Wide Area Networking (WAN) in general, that may be foreign to those who are familiar only with Local Area Network design. Some of the more common Frame Relay terms are briefly described below. [2]
Table 1 – Frame Relay Terms

CIR DCE DTE DLCI HDLC LMI PPP PVC

Committed Information Rate – the minimum level of throughput as guaranteed by the service provider. Data Circuit-terminating Equipment – a device on the service provider's network that connects to the customer's DTE. Data Terminal Equipment – a device at the customer's site that connects to the service provider's DCE. Data Link Connection Identifier – a 10-bit number used to uniquely identify a virtual circuit end-point on the customer's Frame Relay network. High-level Data Link Control – a layer-2 protocol used to control data flow and provide error detection. Line Management Interface – a protocol that provides line status and other management information to the end user of a Frame Relay connection. Point-to-Point Protocol – an alternative to HDLC. Permanent Virtual Circuit – a connection between two nodes on a Frame Relay cloud that allows the exchange of data.

Basic Concepts
When using Frame Relay for WAN connectivity a business customer purchases Frame Relay service from a service provider. The connection to the Frame Relay network is done by attaching a point-to-point link from the customer's DTE to the provider's DCE.

WAN Design With Frame Relay David Horton

Page 3

This connects the customer to the provider's Frame Cloud. Once the connection to the Frame Cloud is in place at two or more of the the customer's sites PVC's can be set up to allow communication between the sites. The PVC's endpoints are identified with a DLCI. Once the connection is up the customer can monitor the status of the line using the functionality provided by the LMI.

A Sample Design
To solidify a basic understanding of Frame Relay consider the example of a fictional company called Zippy's Chips. Zippy's is a nationwide company that makes potato chips and corn chips for sale in vending machines across the country. They have supply offices in Boise, Idaho and Des Moines, Iowa as well as manufacturing centers in Dallas, Texas; Portland, Oregon and Chicago, Illinois. The Zippy's corporate office is located in Schaumburg, Illinois. Distribution of Zippy's products is handled by its business partner, Vend-O-Land Systems, headquartered in St. Louis, Missouri. Zippy's needs to communicate effectively with all of its offices across the country as well as with its business partner in St. Louis. To meet their business needs Zippy's has decided to purchase Frame Relay services from their telecom provider Fat Data Pipe (FDP) Incorporated. To connect its offices to the Frame Relay cloud Zippy's has purchased a mixture of full and fractional T-1 lines. A full T-1 line connects its Schaumburg headquarters to the frame cloud and fractional T-1 lines connect each of its supply and manufacturing offices across the country. In addition to this Zippy's shares the cost of a fractional T-1 for the Vend-O-Land main office in St. Louis.

WAN Design With Frame Relay David Horton

Page 4

Figure 1 – Connections to the Frame Cloud

So how did Zippy's know that Frame Relay was the best solution for their network? Did they make an arbitrary decision based on colorful sales literature given to them by FDP or did they carefully weigh the available options and make an informed decision. Hopefully the latter is the case for Zippy's and for any company considering an investment in Wide Area Networking technology. This decision making process will be explored in the next section.

Deciding if Frame Relay is Right for the Network
In order to make an informed decision about wide area connectivity Zippy's has to know the requirements of their network as well as the capabilities of FDP's Frame Relay service.

Advantages of Frame Relay
The main advantage of Frame Relay over point-to-point leased lines is cost. Frame Relay

WAN Design With Frame Relay David Horton

Page 5

can provide performance similar to that of a leased line, but with significantly less cost over long distances. The reason is because the customer only has to make a dedicated point-to-point connection to the provider's nearest frame switch. From there the data travels over the provider's shared network. The price of leased lines generally increases based on distance. So, this short-haul point-to-point connection is significantly less expensive than making a dedicated point-to-point connection over a long distance. [2] Lower cost over distance makes Frame Relay is a good choice for Zippy's Chips since it has offices located across the country. However, if Zippy's only needed to send data between its Schaumburg headquarters and the Chicago manufacturing plant it might make sense to consider a dedicated circuit since the two locations are in the same metropolitan area.

Disadvantages of Frame Relay
The two main disadvantages of Frame Relay are slow downs due to network congestion and difficulty ensuring Quality of Service (QoS). Because all of a provider's Frame Relay customers use a common network there can be times when data transmission exceeds network capacity. The difficulty ensuring QoS is due to the fact that Frame Relay uses variable-length packets. It is easier to guarantee QoS when using a fixed-length packet. Zippy's needs to decide how significant these disadvantages are to the needs of their network and how to mitigate against them. To address the issue of potential congestion, Zippy's should be sure that Fat Data Pipe's Committed Information Rate (CIR) is sufficient to meet the needs of their network. CIR is the minimum level of throughput that the provider guarantees and FDP should be delivering at least this amount of throughput even in times of heavy network load. Zippy's should also carefully examine their present and future quality of service needs. Is voice or video conferencing between sites is something on the horizon? If so, Zippy's may want to examine the ways in which Frame Relay equipment can prioritize traffic and

WAN Design With Frame Relay David Horton

Page 6

determine if these mechanisms are sufficient for to meet their needs. If not, Zippy's may want to consider an alternative like ATM.

Alternatives to Frame Relay
There are other WAN protocols that can be used in place of Frame Relay. A good network designer should always look at the alternatives before making a final decision.

X.25
X.25 is an older technology that is similar to Frame Relay, but not as efficient. The reasons for its inefficiency are due to the fact that it is an older designed conceived when most telecommunications lines were analog. Since analog lines are inherently noisy X.25 loses a large percentage of throughput to error checking overhead when compared to Frame Relay. [3] For modern, digital lines X.25 offers no advantages over Frame Relay and should not be used unless there are no other alternatives available.

ATM
The main differences between ATM and Frame Relay is that ATM uses a fixed-length packet (called a cell in ATM terminology) where Frame Relay uses variable-length packets. [4] Using fixed-length cells makes quality of service (QoS) calculations much more straightforward. Good QoS is important in applications like voice and video conferencing that cannot tolerate significant network delays. The choice to use ATM rather than Frame Relay should be based on the use of these applications as well as pricing and availability.

Designing a Network with Frame Relay
Zippy's has examined all of the alternatives and decided that Frame Relay offers the best combination of price and performance for their Wide Area Network needs. The next step is to design the network to efficiently connect the various sites across the country.

WAN Design With Frame Relay David Horton

Page 7

Choosing the Topology
Since Zippy's will be connecting more than two sites they can choose to use a mesh topology to provide some redundancy in communications links. This redundant arrangement can be either full-mesh, where every site has a connection to every other site on the network, or a partial-mesh, where sites have connections to one or two other sites, but not all. [5] It might seem like full-mesh is the best way to connect since it features the most redundancy, however this is rarely the case in larger networks. The problem is one of management. Full redundancy means more virtual circuits and more virtual circuit connections means more time spent for setting up and monitoring the network.

Connecting the Sites
Zippy's needs to decide how much redundancy, if any, is needed between site and how to best set this up.

Basic Connectivity
Zippy's headquarters is located in Schaumburg, Illinois and is the central clearinghouse for all of the company's data. Given this fact, the WAN design can start as a simple huband-spoke network with the Schaumburg HQ in the center. Each supply office and manufacturing site will have a virtual circuit connected to Schaumburg. Additionally there needs to be a virtual circuit between Zippy's headquarters and Vend-O-Land headquarters. This simple design solves the basic connectivity issue. All sites can communicate with headquarters and all sites may also communicate with each other by routing layer-3 data through headquarters.

WAN Design With Frame Relay David Horton

Page 8

Figure 2 – Hub and Spoke Virtual Circuit Connections

Redundant Links
The basic hub-and-spoke design has one fatal flaw in that it relies entirely upon the Schaumburg office for inter-site communications. If a fire, flood or other disaster should knock out communications at headquarters all of the other sites would be unable to communicate with each other and business would grind to a halt. Even though management would prefer to have all data route through headquarters, it is possible to continue business operations in a less centralized fashion. Providing redundant links between key locations will help ensure business continuity in the event of an unplanned outage. Looking at the way Zippy's does business can help the network designer choose the best places to provide redundancy. The following is a basic outline of the manufacturing and delivery process:

WAN Design With Frame Relay David Horton

Page 9

1. Supply offices in Idaho and Iowa ship potatoes and corn to the manufacturing plants in Portland, Chicago and Dallas. 2. The manufacturing plants turn the raw potatoes and corn into bags of snack chips. 3. Vend-O-Land sends trucks to the manufacturing plants to pick up the bags of chips and deliver them to vending machines across the country. Even this most basic understanding of Zippy's business gives the WAN designer a great deal of information to help plan the placement of redundant links. In particular there are two important facts that will influence the network design: 1. Supply offices must be able to communicate with manufacturing sites so that orders of raw materials arrive when needed. 2. Manufacturing plants must be able to communicate with Vend-O-Land's headquarters so that trucks are dispatched properly. The basic hub-and-spoke design can be enhanced by adding three additional virtual circuits at each manufacturing site; one to the Idaho supplier, one to the Iowa supplier and one to Vend-O-Land headquarters in St. Louis. This partial mesh design takes care of the supply office to manufacturing plant redundancy as well as manufacturing plant to distributor redundancy. With redundant links, Zippy's business can continue to operate even if the headquarters should experience an outage.

WAN Design With Frame Relay David Horton

Page 10

Figure 3 – Redundant Links forming Partial Mesh

Negotiating the Provider Contracts
Now that Zippy's has the topology design all worked out the next step is to take their requirements to Fat Data Pipe, their Frame Relay service provider. FDP will give Zippy's the prices and service level agreements for the frame bandwidth as well as prices and SLA's for the point-to-point links that connect Zippy's site's to FDP's local frame switches. Zippys' network designer can work with FDP to determine the most cost effective solution. The network designer should pay attention to the committed information rate (CIR) that the provider can give and make sure it fits the design. Zippy's should also be careful not to get locked into a contract that would be restrictive to future expansion of the network.

Choosing Equipment
Some Frame Relay providers will include customer equipment like DTE's and routers in the overall package price. If not, Zippy's should plan to purchase equipment from a reputable hardware vendor. The DTE and router can be purchased as separate pieces or

WAN Design With Frame Relay David Horton

Page 11

as an integrated solution. An integrated package, like a router with a plug-in WAN Interface Card (WIC), can offer easier management, space savings and one point of contact for any service related issues.

Scaling the Network with Frame Relay
Every business has plans for growth and Zippy's Chips is no exception. The choice of Frame Relay for WAN connectivity makes network expansion relatively simple. For example if Zippy's opens a new manufacturing plant in Cleveland, Ohio there are only a few simple steps to get the new site on the network. 1. Order a point-to-point link from the new site to FDP's local frame switch in Cleveland. 2. Configure a PVC from Cleveland to the Schaumburg headquarters. 3. Configure redundant PVC's to the supply offices in Iowa and Idaho as well as to VendO-Land's headquarters in St. Louis.

Figure 4 – Scaling the Network to Accommodate Cleveland Plant

WAN Design With Frame Relay David Horton

Page 12

Alternative Topology
With the opening of the Cleveland manufacturing plant the network diagram is beginning to look much more complex. The addition of just one site has resulted in four new PVC connections. If Zippy's continues to expand in this manner the network administrator's job of maintaining and troubleshooting the network will be come considerably more difficult due to the shear number of PVC connections. It may be a good idea to consider alternate ways of connecting the network before rapid expansion causes the network administrator to become overwhelmed with PVC's.

Dual-hub Design
The original network design was a simple hub and spoke topology with the hub located at Zippy's Schamburg, IL headquarters. The reason for multiple PVC connections to each site was to provide business continuity in the event of a disaster in the Schaumburg data center. Now that the network is expanding Zippy's needs to reduce the number of PVC connections but still maintain redundant connections for fault tolerance. These requirements stated above can be met by using a dual-hub design. With a dual-hub design Zippy's chooses one of its sites to serve as a second hub and makes PVC connections to each of the other sites from there. [6] For example, Zippy's management may choose the Dallas manufacturing plant as a second hub for the network.

WAN Design With Frame Relay David Horton

Page 13

Figure 5 – Dual-hub Design

Management may have chosen the Dallas site for a number of reasons. Perhaps the plant has a larger, more modern data center than the other offices or maybe it has a very capable network administrator on staff. However, it is far more likely that management made the decision based solely on the fact that if the Schaumburg headquarters is in ruins they would like to fly somewhere warm, far away from the board of directors and with easy access to margaritas. Therefore, it is up to the network administrator to make sure that the equipment is suitable for the task of acting as a second hub. It may be necessary to upgrade or replace the Dallas router in order to make this design work.

Co-location With Vend-O-Land
Another way of implementing the dual-hub design is to use Vend-O-Land's facility in a co-location agreement. In this type of situation Vend-O-Land agrees to let their data center be used as a backup site for Zippy's and conversely Zippy agrees to become a backup for Vend-O-Land.

WAN Design With Frame Relay David Horton

Page 14

Figure 6 – Co-located Design

From a technical standpoint this design is no more difficult to implement than the Dallas dual-hub design. However, there are many legal details to be worked out between the two companies before this design can become a reality.

Conclusion
When designed correctly Frame Relay can provide a cost-effective WAN solution for businesses with offices dispersed across the country. The example of Zippy's Chips shows how Frame Relay can be used to provide connectivity to multiple sites as well as redundancy to aid in disaster recovery. The choice of Frame Relay also allows for easy expansion of the business and flexibility in the design of the network.

WAN Design With Frame Relay David Horton

Page 15

References
1: SBC Communications, SBC PremierSERV (SM) Frame Relay Service, 2004, http://www05.sbc.com/Products_Services/Business/ProdInfo_1/1,,942--9-1-33,00.html 2: Dennis Baasch, Emerging Technologies Frame Relay FAQ, 1997, http://www.etinc.com/index.php?page=frfaq.htm 3: Sangoma Technologies, Sangoma - X.25 Tutorial, 2004, http://www.sangoma.com/x25.htm 4: SBC Communications, SBC PremierSERV (SM) ATM Service, 2004, http://www05.sbc.com/Products_Services/Business/ProdInfo_1/1,,900--9-1-33,00.html 5: Webopedia Computer Dictionary, What is mesh?, 2004, http://www.webopedia.com/TERM/m/mesh.html 6: Howard C. Berkowitz, Designing Routing and Switching Architectures for Enterprise Networks, 1999

Similar Documents

Premium Essay

Security Policy Framework

...Security Policy Framework CIS 462 01 February 2014 As organizations grow, and rely more on information systems as the primary means of conducting operations, keeping those systems and its information secure has become one of the biggest priorities ever. In order to ensure information security, the organization must take appropriate security measures to make sure that no information is put in the hands of unauthorized personnel. Having a comprehensive information security framework in place along with sound standard operations procedure (SOP), and policies and regulations can help any organization keep its systems and information secure. When developing a framework for any organization you must choose what will be best for that organization, although the NIST (SP 800-53), ISO/IEC 27000, and COBIT all are frameworks that offer many different security programs, there is no wrong framework to choose, but choosing the one that works for your organization can be a tough decision for any manager to make. With the insurance organization I would choose to implement the ISO/IEC (27000) framework. That way we can concentrate on establishing and managing an IT security program. The ISO/IEC covers information security standards that are published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) that develop and publish international standards. By using this framework we can provide all necessary best practices...

Words: 1310 - Pages: 6

Premium Essay

Wan Structure

...ABSTRACT When designing project for a top level enterprise-wide telecommunications network for ABC Company (ABC) with worldwide offices in the U.S. (San Francisco, Detroit, Washington, Indianapolis, Tampa), Europe (Paris, Liverpool), Japan (Tokyo), and South America (Sao Paulo), is engaged in the development of audio and video special effects for the entertainment and advertising industry. It is imperative as team member to work diligently and closely to deliver a quality project on time for the company. We [must] keep in mind as well to meet some technical customer requirements, keep the network managed and running at its best performance, and ensure that the network is pretty secure. The design for this network begins by designing the local network, at each of the provided locations, and then connecting all the offices together in an effective Wide Area Network (WAN) Design. The network design will include both voice and data sharing. Microsoft Project will be used as a tool to organize and manage the complete project, and it will include budget and schedule. We also must remember that the main design centers are in San Francisco, Detroit, Paris, Tokyo, and Sao Paulo, with Corporate Headquarters lodged in San Francisco. The remaining offices are used as sales offices. Consider the company to operate on a 24 hours a day and 7 days a week basis, because it is global. It has been said, that with the advent of globalization, WAN has become a major artery for communication...

Words: 1405 - Pages: 6

Premium Essay

Is2007

... 0.2 WHY INFORMATION SECURITY IS NEEDED? 0.3 HOW TO ESTABLISH SECURITY REQUIREMENTS 0.4 ASSESSING SECURITY RISKS 0.5 SELECTING CONTROLS 0.6 INFORMATION SECURITY STARTING POINT Information security is defined as the preservation of confidentiality, integrity and availability of information … Information security is defined as the preservation of confidentiality, integrity and availability of information … 0.7 CRITICAL SUCCESS FACTORS 0.8 DEVELOPING YOUR OWN GUIDELINES 1 SCOPE 2 TERMS AND DEFINITIONS 3 STRUCTURE OF THIS STANDARD 3.1 CLAUSES Security controls directly address risks to the organization, therefore risk analysis is a starting point for designing controls. Security controls directly address risks to the organization, therefore risk analysis is a starting point for designing controls. 3.2 MAIN SECURITY CATEGORIES 4 RISK ASSESSMENT AND TREATMENT 4.1 ASSESSING SECURITY RISKS Information security policies, standards, procedures and guidelines drive risk management, security and control requirements throughout the organization Information security policies, standards, procedures and guidelines drive risk management, security and control requirements throughout the organization 4.2 TREATING SECURITY RISKS 5 SECURITY POLICY 5.1 INFORMATION SECURITY POLICY 5.1.1 Information security policy document 5.1.2 Review of the information security policy 6 ORGANIZATION OF INFORMATION SECURITY Defines the hierarchical structure and reporting...

Words: 1623 - Pages: 7

Premium Essay

Packet Filtering Firewall Essay

...Abstract Networks are nowadays the core of modern communication. Computer or data network is a telecommunication network allowing computers to exchange data, files and also allow remote computing, that is, giving authorized users the ability to access information stored on other computers found on the same network. This exchange of data is carried through network links which are established between nodes using either cables or wireless media. Most information in computer networks is carried in packets, thus, increasing the difficulty to manage and secure the network from hazards such as security threats. Undesired packets may easily harm the systems. To counter such infected packets, firewall has been implemented with packet filters which check...

Words: 2254 - Pages: 10

Premium Essay

Is3230

...verification is the opposite of positive verification. The customer must contact the bank to verify that the information is correct. 3. What vulnerabilities are introduced by implementing a Remote Access Server? Could Allow Remote Code Execution, two heap overflow, cross-site scripting (XSS) vulnerability that could allow elevation of privilege, enabling an attacker to execute arbitrary commands on the site in the context of the target user. 4. What is a recommended best practice when implementing a Remote Access Policy server user authentication service? Using multi-factor authentication. 5. Name at least 3 remote access protections or security controls that must be in place to provide secure remote access. Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control. 6. When dealing with RADIUS and TACACS+ for authentication methods, what protocols are used at Layer 4 for each of these techniques? UDP for RADIUS and TCP for TACACS+ 7. In TACACS+ communications, what part of the packet gets encrypted and which part is clear text? MD5 for encryption and XOR for clear text 8. In RADIUS authentication, what is the purpose of the “Authenticator”? To provide a modest bit of security. 9. Which of these two,...

Words: 1143 - Pages: 5

Premium Essay

Computer Security & Privacy - Tjx

...breach had affected Customers - pay for the purchases made by the intruders/ card invalidated / expiring the spending power, Financial Institutions –re-issue the cards for those customers whose information was compromised, Store Associates –change their credentials for system access, Vendors, Merchandisers - Modify the information shared due to mutual network and Richel Owen, CSO- design long and short term strategy to address the security breach issue. Intruders utilized the data stolen to produce bogus credit/debit cards that can be used at self-checkouts without any risks, and had also employed gift card float technique. Case Analysis: TJX learnt about the hacking on December, 2006 through the presence of suspicious software and immediately called in Security consultants for assistance. TJX had been intruded at multiple vulnerable points – Encryption, Wireless attack, USB drives, Processing logs, Compliance and Auditing practice. Encryption - Intruder had accessed the card information during the approval process and had the decryption key for the encryption software used in TJX. This can be addressed by purchasing or designing an encryption algorithm that uses advanced encryption standards like asymmetric encryption algorithm, which employs a pair of keys (public and private) and uses a different component of the pair for different steps of the algorithm that complicates decrypting of the data packets. Wireless Attack – Data streaming between IP enabled devices had been hacked...

Words: 620 - Pages: 3

Premium Essay

Nt2580 Remote Access Policies

...NT2580 Week 2 Essay Create a Remote Access Policy Definition NT2580 The requirements for establishing a secure connection between remote locations vary between organizations. The needs of the organization are based on the type of information and data being transferred, as well as the sensitivity of the information. There are several options available to networks to get their data sent securely and reliably. All seven layers of the OSI model must be taken into account when designing secure Remote Access Control Policies. In order to create a secure remote connection between offices in Atlanta, San Francisco, Chicago, and Dallas, a WAN link would be the best type of connection. A dedicated WAN link would offer the organization a secure, reliable, dedicated P2P type of connection. Wide Area Network links would be monitored by the owners of the lines that connect each location. Leased lines from the providers will allow for scalability with potential growth. The downside to this type of connection is the expense and an internet connection is not necessarily provided by the link. In order to add to the security of the network physical and logical access controls are necessary. Logical implementations added to the network will be Acceptable, Email, and Wireless Use policies, Antivirus and firewall software, as well as Extranet, Interconnection, and Host Security. In order to ensure the physical assets, as well as employees, physical security must also be considered. Locked...

Words: 704 - Pages: 3

Free Essay

Service Request Sr-Rm-022, Part 2

...will work to improve the proper handling within Riordan Manufacturing to ensure the best relationship between each department. Once the final implementation is installed it will not only improve communication within the company but it will also help save time and money. Security Security should be the highest point of interest or concern of any project. Security is mainly the responsibility of the group operating the system, which would make it the company’s staffs responsibility to install and operate security controls such as firewalls, anti-virus software, and also performing routine updates, and data backup and recovery points. All data needs to be kept secure and confidential at all times. Any company data such as policies, procedures, employee, or customer information needs to be secure and it is Riordan Manufacturing’s responsibility to make sure there systems are capable of doing so. All the information on company computers should be password protected, encrypted, and only give authorized personnel access to such information to ensure data safety. If any information especially “sensitive information” were to get into the wrong hands it could really hurt the business, lawsuits alone could end up destroying the company depending on what information was compromised and what exactly was done with it. Process Certain processes throughout the system such as the application process could benefit more from using third party software. By using a...

Words: 673 - Pages: 3

Premium Essay

Unit 6 Discussion

...--[endif]-->You will be able to explore design and firewall rules for a bastion host. <!--[if !supportLists]--> <!--[endif]-->You will examine how a bastion host allows administrators to access Samba and Secure Shell (SSH) for remotely managing a server. Assignment Requirements As the Linux system administrator of insurance company Secure All, Inc., you need to design firewall rules for the organization’s bastion host file server, which uses Samba. This server is located in the local area network (LAN) with the network address 172.16.0.0/12 and subnet 255.240.0.0. The server should also allow Web application access for its online transaction platform to mount the filesystem. The Web application resides on the Web server located in the demilitarized zone (DMZ). This server has two interface cards. One card, which is for the traffic from the DMZ firewall, is linked to the wide area network (WAN). This card’s IP address is 192.168.1.5. The other interface card has the IP address 172.16.1.5 and is linked to the LAN. Which firewall rules should be written using iptables for the server hosting Samba? Discuss and suggest firewall rules to allow administrators to remotely manage the server using SSH. Use the concept of “default deny” when designing the rules. Participate in this discussion by engaging in a meaningful debate regarding the firewall rules that can be written using iptables. You must defend your choices with a valid rationale. At the end of ...

Words: 922 - Pages: 4

Free Essay

Paper

...Network Security Planning By: Marticia Goodwin CIS 532 / Professor Danielle Babb August 19, 2012 Strayer University SAFE is a reference architecture that network designers can use to simplify the complexity of a large internetwork in which the architecture lets you apply a modular approach to network design. Traditional point security tools are limited in their ability to support and securing a business transformation, either leaving critical new resources unprotected or preventing the deployment of new services as they do not secure new processes and protocols. At the same time, organizations are facing a host of new threats that target many of these new services and impact network and service availability (Lippis, 2012). With SAFE, you can analyze the functional, logical, and physical components of a network and thus simplify the process of designing an overall enterprise network, but CISCO SAFE architecture is especially concerned with security. SAFE takes a defense in-depth-approach in which multiple layers of protection are strategically located throughout the network and the layers are under unified strategy for protecting the entire network and the various components of the network, including individual network segments, infrastructure devices, network services, endpoints, and applications (Oppenheimer, 2011). SAFE architecture is comprised of the following major modules: core, data center, campus, management, WAN Edge, Internet Edge, branches, extranet, partner...

Words: 974 - Pages: 4

Premium Essay

Nt1330 Unit 3 Assignment

...Internet of Things, also known as IoT, refers to the embedded devices that are connected to and communicate with each other via internet and range from small devices like smart watches and other every day wearables to much larger devices like cars and other automobiles, medical equipment etc., In my opinion, the traditional security methods like authentication, encryption, intrusion detection and intrusion prevention, firewalls, installing security patches etc., may be applicable to Internet of Things only if the devices are deployed and used in a controlled, secure and well monitored environment like enterprise network, which will not be the case with most of the devices that can be classified under IoT, as a user must be able to use his/her...

Words: 497 - Pages: 2

Premium Essay

Mobile Computing and Social Networks Term Paper

...Mobile Computing and Social Networks. Abstract Mobile computing has rapidly evolved for the last two decades with the use of wireless technology making the location irrelevant and increasing the opportunities for business to streamline business processes, reduce operational processing times and provide better customer service. Mobile revolution has also forced many industries to reengineer their business processes to accommodate the many mobile devices. Mobile computing and social networks are part of the daily lives of millions of Americans. 42% of American adults own a mobile and tablet computing device. “Additional research shows that about three quarters of U.S. adults are online, with about 66% of them using social networking sites” (Brenner, 2012). Specific methods for how IT departments and mobile app developers and designers can decide on supporting different mobile platforms like the Apple iPhone, Apple iPad, Windows Phone, or Android supported smartphones and tablets will be discussed. Other topics addressed in this paper include the issue of “high availability” for mobile app users’ Based on these considerations organizations and businesses are nowadays focusing on the implementation of these applications, while replacing their desktop platforms to the mobile devices (Shih, et.al. n.d). “On the other hand, it is also observed that, these applications may also enhance various risks and vulnerabilities,...

Words: 4537 - Pages: 19

Premium Essay

Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

...For a better understanding of the situation in the network of the company I decided to start the analysis by the vulnerabilities that this one presents. Many of these vulnerabilities are the cause for different types of network attacks. It should be noted that while many of these vulnerabilities may be mitigated or eliminated the possibility of an attack always exists. The first vulnerability is the email server. Although very well controlled for been within the Demilitarized Zone (DMZ), this is always a vulnerability with which most companies have to deal with. This vulnerability opens the way for phishing attack. One way to mitigate this vulnerability is configuring the email server so that only authorized email may enter. This is difficult because our video game company has a large list of customers and suppliers that are in constant change. The best option is to alert users about the security measures and company policies regarding private and unknown emails. The Web and FTP server can be a not very alarming vulnerability. Because it is located in the DMZ and after the Intrusion Detection System (IDS), is unlikely to be corrupted without being detected. The location of the file servers in the network is totally unprotected against internal attacks. Any successful attack in the LAN would leave the data servers exposed. The establishment of a demilitarized zone with a completely different set of log on names and password than any other machines would give these servers better...

Words: 1141 - Pages: 5

Premium Essay

Risk Assessment

...technological innovation and automation of their systems. However, as GFI experienced a steady growth in its financial operation, a significant security risk lack within its network. GFI relies on its application servers; the Oracle database and the email system that are the backbone of the GFI financial operations. The financial and cash flow system of the company solely depends on the network, any network breakdown, and system failure would be catastrophic for the business and its clients. The recent multiple cyber attacks on the GFIs network and the 2012 Oracle server attack that left the company integrity, confidentiality and availability venerable for several days. Although the servers were restored, the damage was extensive and lead GFI to pay for clients damages in their loss of data confidentiality. Another attack left the entire GIF network down that lead to losses in revenues and intangible customer confidence to the tunes of over a million US dollars. Risk Assessment Purpose The aim of this risk assessment is to evaluate the details of GFI network security. Further, the risk assessment is to come up with a structured qualitative assessment of GFIs network environment and provide possible solutions for mitigating the sensitivity, threats, vulnerabilities, risks and safeguards of the GFIs network. Besides, the assessment will recommend on a potential cost-effective assurance that will combat the threats and associated exploitable...

Words: 2661 - Pages: 11

Premium Essay

Nt1310 Unit 5.3 Network Design

...Design phase is the most important and analytical phase. The network design is developed based on the technical and business requirements obtained from the planning phases. The network design specification is a comprehensive detailed design that meets current business and technical requirements. It provides high availability, reliability, security, scalability, and performance. The design includes physical, logical network diagrams and an equipment list. The project plan is updated with more specific and detailed information for implementation. 5.3.1 Network Topology Design After everything have been detailed in the plan phase, I proceed to design them according to the paperwork or project plan. During this stage, I have design the topology for the new office which meet the requirement and criteria stated. Both physical and logical diagram are being created in this phase. The application or software that I used to design the topology is Creately.com and Packet Tracer 7.0. Creately.com is an online application that provides user to draw UML diagram, flowchart, network diagram and many more. The reason that I used this online application is it is free and easy to use instead of I need to draw by myself for the physical topology. Figure 4 - Creately Homepage GUI Figure 5 - Cisco...

Words: 838 - Pages: 4