Free Essay

Medium Network Design

In:

Submitted By yefo07
Words 1290
Pages 6
Universidad Interamericana, Recinto de Guayama | Diseño de una Red Mediana | |

Luis Lugo
16 de enero de 2013 |

Introducción

En este trabajo estaré diseñando una red mediana para un colegio técnico el cual contiene pocos estudiantes. Este diseño usa conmutadores en las capas 2 y 3 proveyendo servicios a usuarios y a la misma vez seguridad para toda la red. La organización tiene alrededor de 700 usuarios y existen diferentes dominios dentro de esta red.

Diseño

Este diseño debe tener varios requerimientos específicos para poder completar lo que es una red mediana segura. Uno de estos requerimientos y el mayor de estos es que la red debe de proveer conectividad para tres servidores y alrededor de 700 clientes. De la misma manera, la red va a permitir que si en alguna ocasión alguno de estos equipos necesita separarse el otro, esto sea posible. En esta red otro de los requerimientos importantes es el de evitar ataques, ya que como la red va a estar comunicándose entre dos edificios, esta es más susceptible a ataques que provengan de afuera.
El centro o “core” de esta red es un solo conmutador de capa 3 con interfaz de “Ethernet” este conmutador “core” le provee los servicios de índole de ambas capas (2 y 3) hacia los equipos necesarios. La red tiene 4 sub redes diferentes, una de estas es para los servidores, otra para los clientes, otra para el sistema de red inalámbrico y la última para la administración. Se diseñó un NDIS para monitorear el tráfico en el conmutador “core” ya que la mayoría del trafico va a estar fluyendo por aquí, siempre es bueno tener un monitoreo de todo lo que pasa. Este conmutador “core” actúa doblemente como un conmutador de la capa de “core” y también actúa como un conmutador de la capa de “distribution”. Dos conmutadores de capa 2 son los que se ocupan de la capa de “access” que es la que se usa para los usuarios. Estos conmutadores de capa 2 hacen uso de VLANS para manejar y controlar diferentes dominios que están a nivel de usuario. Los puntos de acceso de la WLAN también son conectados a través de estos conmutadores. Ya que se tiene ambas redes, WLAN y VLAN, el tráfico de estas es separado para que no sea confundido.

El servidor “LTC” es utilizado p ara las necesidades que puedan tener las identidades de la red “edge”, de WLAN y cualquier acceso de la administración a cualquier equipo. Se usó el protocolo de seguridad 802.1x el cual es manejado por este mismo servidor y es el que provee toda la autenticación.
La seguridad individual dividida por los diferentes equipos y sus roles

Refiriéndose a todos los conmutadores de la red, primero se les trabaja con su configuración para evitar que sean tan vulnerables teniendo la configuración con la que vienen de fábrica. Se configura el protocolo de control L2 en el cual se configura el STP BPDU en todos los puertos de las computadoras para así prevenir problemas de “spanning tree”. Otro de los mecanismos de seguridad que se implementan es el de la seguridad de los puertos, limitando el número de direcciones MAC por cada puerto en cada conmutador. También se utiliza seguridad en los VLAN haciendo buen uso de los que es “VLAN hopping” para manejar el tráfico en estas redes. Por último se trabaja con lo que es DHCP y se utilizan las listas de acceso de las VLANs.
Ahora bien, solo en el conmutador “core”, se configura el filtrado RFC 2827 usando URPF. Se configuran listas de acceso para bloquear tráfico innecesario.
Nos vamos dos servidores internos y aunque estos se trabajan con un poco menos de importancia en la seguridad, no se deben de olvidar. Ya que es una red mediana y solamente tenemos 2 servidores internos, es una tarea fácil, hacerlos seguros. Lo más primordial que se hizo fue poner a que las contraseñas caduquen cierto tiempo, proteger las comunicaciones sensitivas entre cliente y servidor, se actualizo el sistema operativo pero solo los updates que ya están comprobados de no hacer más daño de lo que ayudan. Se instaló un antivirus en cada equipo en la red incluyendo los servidores y los usuarios. Se configuro un sistema local de IDS para contrarrestar los ataques a los servidores. Por último se trabajó con un sistema de filtrado de correos electrónicos para evitar la propagación de ataques por medio de este medio.
Luego de proteger los servidores, nos movemos al equipo que es usado por los usuarios. Casi siempre por donde empiezan los ataques es por esos equipos. Es por esto que se configuro para que cada usuario tuviera una contraseña para poder entrar al sistema. Luego se configuro para poder instalar updates remotos directamente desde los servidores. Al igual que los servidores también se instala software de antivirus y un firewall en todas las computadoras.
El equipo NIDS que se corre desde el conmutador “core” y monitorea todo el tráfico entre dominios también se debe implementar un tipo de seguridad. Al igual que los conmutadores, se configuro de tal manera que es más fuerte ahora y no se basa en la configuración de fábrica. Además de esto se le indica al NIDS de donde leer las clasificaciones de ataques más comunes para que este pueda detectarlos con mejor acierto.
Para el servidor central el “LTC” se configuro RADIUS/TACACS+ para proteger toda la información que se guarda en este servidor, incluyendo credenciales de usuario, de las VPN y de administración.
Por último los puntos de acceso de la red inalámbrica o WLAN se configuraron también de manera que no llevan la configuración de fábrica.

Evaluación de amenazas

Dejándome llevar por los tipos de ataques más conocidos y la seguridad que he implantado en el diseño de esta red mediana, el mecanismo para evitar y combatir ataques es bastante rígido. En ataques de “spoofing” se detecta con “RADIUS/TACACS+”. Ataques de índole como virus, “worms” y trojanos se pueden detectar con el NIDS y se le pone un alto con lo que son los sistemas de filtrado de correo y los antivirus instalados. Ataques tipo “snifer” son detenidos por mecanismos como la seguridad en los puertos de los equipos y teniendo VLAN privadas. En los ataques de acceso directo se pueden detectar gracias al NIDS y se detienen usando el mecanismo de contraseñas, “firewalls”, VLAN privadas y listas de control de acceso. Ataques de programación de control remoto se detectan fáciles con el NIDS y se detienen con los antivirus instalados en los equipos, los firewalls y el filtrado de correos. Por ultimo ataques peligrosos de “buffer overflow” se pueden detectar usando el NIDS y se detienen gracias a la configuración extensa en los sistemas operativos para hacerlos más cerrados.

Conclusión

En este trabajo diseñe lo que es una red mediana en específico para un colegio técnico con no más de 700 clientes a la red. De la forma que lo diseñe, pudo haber tenido más seguridad, que es en lo que se basa esto, pero me deje llevar que también tiene que ver el costo. Por ejemplo pude haber añadido un “firewall” entre los servidores en vez de listas de control de acceso, para así hacerlo más protegido, pero esto también significaba más costo. Aunque el costo no era un factor en esto, si lo es en vida real y de eso me deje llevar. El diseño es de una red seguro y se probó con los tipos de ataques más famosos que ocurren en estas redes y existen varios mecanismos para detectar y/o detener estos ataques.

Bibliography
Chung, J., Pueblas, M., Nadimi, A., Hamilton, D., & Farrington, S. (2010). Cisco SAFE Reference Guide. Cisco Systems, Inc. .

Similar Documents

Premium Essay

Biography

...Systems Design What is a System? Give examples. A set of components working together for a common objective Information Systems (Web-based) H/w, S/W, people, Data, Procedures, Web-portals What is SDLC? Systems Planning, Systems analysis, systems design, systems development, implementation, maintenance IS alignment IS Success IS usage User satisfaction Information waste IS enabled Competitive advantage Orgl change Orgl learning TAM Easy to use Perceived personal usefulness Web-based Information System Banner – Assess the levels of Flexibility Stakeholders What is Systems Design? Input design Output Design Interface design Database Technology – Network architecture, Communications Technology Flexible Systems Design for Web-based IS? Examples: Banner, Amazon.com, Dell.com – Identify the systems design elements Flexible Systems Design for Web based Information Systems (Research) BOM changes affect MRP In the Banner system, what are the changes that could occur? How do we respond to these changes? Interviews them Users – Students, Registrar (Shannon), Dean, etc. Designers / Planners – Gary Administration - Explore the dimensions – Extent, Options, cost, easy, Range, etc. Gain more insight by getting more examples. • Application architecture Design • Interface design (User/ System) • Database • Network • Prototype • Systems controls Case...

Words: 1598 - Pages: 7

Free Essay

Case Study 3

...Case Study3: Design Scenario Klamath Paper Products Name: Fabio M. Cesar Professor: Edwin Otto Course: Network Architecture and Analysis Date: 12/04/2012 Many routing protocols are based on algorithms designed to obtain the shortest path between two points, disregarding metrics such as delay and congestion. However, the demand for speed and bandwidth on this environment is causing the depletion of resources available in the current network’s infrastructure. The users are constantly seeking larger applications, causing congestion and degradation of performance. Therefore, the goal is that the network support the various services and user’s requirements effectively by the techniques of Quality of Service (QoS). The Internet service is based on end-to-end without connection, which provides transport of best-effort data by using TCP / IP (Transmission Control Protocol / Internet Protocol). The QoS functions are expected to guarantee delivery and to differentiate IP services to network resources and for controlling the operation of the network. QoS is a set of service requirements that must be known by the network in the “Flow of Transportation” guaranteeing the service for the end-to-end, based on policy measured on performance, resource allocation, switching, routing, routing of packets and packet loss mechanisms. With the use of QoS in IP, networks can support the existing applications and emerging applications...

Words: 797 - Pages: 4

Premium Essay

Essay On Internet Advertising

...How to advertise on the InternetFor Growing Business http://www.crecenegocios.com/como-hacer-publicidad-en-internet/ Internet advertising, also known as online advertising or online advertising, is a type of advertising that has as medium or communication channel Internet. Internet advertising allows us to introduce our brand, product or service and persuade your purchase, consumption or use, millions of people located around the world, 24 hours a day, 365 days a year. But in addition to its broad scope, several other the advantages of advertising on the Internet , among which are: its high effectiveness : mainly because it allows us to specify the type of audience to which to direct our ads. its low cost : use a medium or design a banner usually does not involve higher costs. ease of use : Use a...

Words: 2181 - Pages: 9

Premium Essay

Computer Networking

...Term paper of computer networking (Design wireless network) x.y.z. Abstract: this document tells us about wireless network and various techniques to design a computer wireless network Keywords—wireless networks, connecting devices, switches, hubs. [pic] Campus network A campus network is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. The networking equipments (switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling etc) are almost entirely owned (by the campus tenant / owner: an enterprise, university, government etc). In the case of a university campus-based campus network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls. [pic] | | | | Introduction A computer network allows sharing of resources and information among devices connected to the network. The Advanced Research Projects Agency (ARPA) funded the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defence. It was the first operational computer network in the world. Development of the network began in 1969, based on designs developed during the 1960s. For a history see ARPANET, the first network . Purpose • Facilitating communications. Using a network, people can communicate efficiently and easily...

Words: 1521 - Pages: 7

Premium Essay

Creatimg a Network Solution

...Create a Network Solution Name: Course: Tutor: Date: Create a Network Solution. Many methods of using computer networks for data storage have come up in recent years. The most common and popular approach which I personally prefer is the network attached storage (NAS).NAS allows businesses more affordably that before to store and retrieve large amounts of data. Most businesses do not consider the future expansion of their companies when creating their network solutions and end up exhausting their network resources. The increase in the data capacities of the electronic components used in today business world has led to the demand for a more convenient storage type. The ability to use a file server to store files has led to companies deploying large centralized NFS servers which are accessed by thousands of clients. Central file servers are seen as the basic solution to demands put forward. A file server is in basic terms a workstation or a personal computer hardware running on a network operating system (NOS).The NOS in this case boasts file sharing capabilities. The hard drives installed in the computers are used to provide the required storage space ranging from gigabytes to terabytes of memory space depending on the size of business. Many business owners are not justified by the use of a fully general-purpose computer as a server for simple storage services. This factor brought to the development of the network attached storage (NAS). NAS creates a system...

Words: 1467 - Pages: 6

Premium Essay

Internetworking

...INTERNETWORKING INTERNETWORKING Abstract A local area network (LAN) is a communication network that interconnects a variety of data communicating devices within a small geographic area and broadcasts data at high data transfer rates with very low error rates. Since the local area network first appeared in the 1970s, its use has become widespread in commercial and academic environments. It would be very difficult to imagine a collection of personal computers within a computing environment that does not employ some form of local area network. This chapter begins by discussing the basic layouts or topologies of the most commonly found local area networks, followed by the medium access control protocols that allow a workstation to transmit data on the network. We will then examine most of the common local area network products such as Ethernet and token ring. Local Area Networks also called LANs have been a major player in industrialization of computers. In the past 20 or so years the worlds industry has be invaded with new computer technology. It has made such an impact on the way we do business that it has become essential with an ever growing need for improvement. LANs give an employer the ability to share information between computers with a simple relatively inexpensive system of network cards and software. It also lets the user or users share hardware such as Printers and scanners. The speed of access between the computers is lighting fast because the data has a...

Words: 1743 - Pages: 7

Premium Essay

Exemptions

...Local Area Networks – The Basics Chapter 7 Learning Objectives After reading this chapter, you should be able to: • • • • • • • • State the definition of a local area network List the primary function, activities, and application areas of a local area network Cite the advantages and disadvantages of local area networks Identify the physical and logical local area networks Cite the characteristics of wireless local area networks and their medium access control protocols Specify the different medium access control techniques Recognize the different IEEE 802 frame formats Describe the common local area network systems Chapter Outline 1. Introduction 2. Primary Function of Local Area Networks 3. Advantages and Disadvantages of Local Area Networks 4. The First Local Area Network – The Bus/Tree 5. Star-Wired Bus LANs 6. Medium Access Control Protocols a. Contention-based protocols 7. Bridges a. Transparent bridge 8. Switches a. Virtual LANs b. Isolating traffic patterns and providing multiple access c. Full-duplex switches 9. Popular Local Area Networks a. Wired Ethernet b. Wireless Ethernet 10. IEEE 802 a. IEEE 802.3 and 802.5 frame formats 11. LANs In Action: A Small Office Solution 12. LANs In Action: A Home Office Solution 13. Summary Lecture Notes Introduction A local area network (LAN) is a communication network that interconnects a variety of data communicating devices within a small geographic area and broadcasts data at high data transfer rates with very...

Words: 4358 - Pages: 18

Premium Essay

Introductory Concecpt in Transportation Decision Making

...development. 2 Network-Level Planning 2 Project development 2 Programming 3 Budgeting 3 Financial Planning 3 Part two. Process of transportation project development (PDP) 3 PDP Steps 3 Impact of transportation system stimuli 7 Impact categories and types 8 Dimensions of the evaluation 9 Geographical scope of impacts 10 Other Ways of categorizing transportation system impact 11 Role of evaluation in PDP and Basic Elements of evaluation 11 Role of evaluation in PDP 11 Reasons for evaluation 11 Measures of a project’s worth 12 Procedure for transportation system evaluation 13 Conclusion 15 Introductory concepts in transportation Decision Making Creniaut Emilien -陳玉偉 – 0245037 – NCTU Report Introduction The transportation system is nowadays the largest public sector for any countries. The economic growth and the productivity are linked with the efficiency of the transportation network. All of the capitalist is, now, based on the accessibility of goods and facilities. Constantly we need to improve our transportation network. So transportation agencies have to make lot of assumption in order to improve our network. But it will involve our environment a lot, that’s why decision making is essential in transportation Part one Overall transportation program development. Network-Level Planning This planning demand an evaluation of travel demand based of the last studies and figures. With every aspect the network level planning...

Words: 1351 - Pages: 6

Premium Essay

Networking

...infrastructure of a network. The infrastructure is the hardware that enables computers to communicate with each other. My infrastructure is based on a star topology and can go from a LAN to a WAN very easily. I will begin with the type of cable that will be used to wire and connect my network. The cable I will use will be an Ethernet, coax interface also known as 10-base-2.The computers are connected to make a chain (like a star) and the coaxial 50ohm cable connects each “T” to the “T” on the next computer. The next technology that I will use is a hub/router. The hub houses a separate connection to each computer on the network. Any data entering the hub on one of the cables connected to it is repeated out onto all other cables connected to the hub. From there, it is then sent through a server and gateway. The gateway is tied into the Active Directory of all the computers on the network. From the server/gateway, it then goes into a Main Switch. The switch examines each arriving data packet and finds the packet's destination address. It then only sends data out to the port associated with that address. This cuts out a lot of needless network traffic and thus is why it is so important to have on a network. Finally, on my network is a Bridge. All computers end up connecting to the same wire and so they have to wait for silence on the network before they can transmit data. This causes delays and the slowing down of response times of the network. By breaking the network into sections, this...

Words: 971 - Pages: 4

Premium Essay

Mutiple Choice Is 3300

...Difficulty: Easy Reference: p. 6 Dell Computer’s use of information systems to improve efficiency and implement “mass customization” techniques to maintain consistent profitability and an industry lead illustrates which business objective? a. b. c. d. Improved flexibility Improved business practices Competitive advantage Survival Answer: c 4. Reference: p. 3 The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage, operational excellence, and: a. b. c. d. 3. Difficulty: Medium Difficulty: Hard Reference: p. 8 The use of information systems because of necessity is: a. b. c. d. survival improved business practices competitive advantage improved flexibility Answer: a Difficulty: Medium Reference: p. 9 5. (Analysis) Which of the following choices may lead to competitive advantage (1) new products, services, and business models; (2) charging less for superior products; (3) responding to customers in real-time? a. b. c. d. 1 only 1 and 2 2 and 3 1, 2, and 3 Answer: d Difficulty: Hard Reference: p. 8 Analysis in terms of compare 6. Verizon’s implementation of a Web-based digital...

Words: 31016 - Pages: 125

Premium Essay

Marketing

...furniture manufacturer headquartered in Bassett, Virginia, United States. It was founded in 1902 by John David Bassett (July 14, 1866 – February 26, 1965) and C.C. Bassett. Bassett Furniture is one of the oldest furniture manufacturers in Virginia and has been producing hand crafted furniture for over 100 years. “Incorporated in Delaware in 1989, Ethan Allen Interiors Inc., through its wholly-owned subsidiary, Ethan Allen Global, Inc., and Ethan Allen Global, Inc.’s subsidiaries (collectively, "We," "Us," "Our," "Ethan Allen" or the "Company"), is a leading manufacturer and retailer of quality home furnishings and accessories, offering a full complement of home decorating and design solutions through one of the country’s largest home furnishing retail networks. We refer to our Ethan Allen retail outlets as "design centers" instead of "stores" to better reflect these expanded capabilities” (COMMISSION, 2013). Ethan Allen is a furniture manufacturer headquartered in Danbury, Conn in the United States. It was founded in 1932 by Nathan S. Ancel, Ethan Allen Co-founder. Ethan Allen furniture is one of the of the nation's largest furniture companies, with more than 300 dealers and 21 manufacturing plants in the United States (Khurana, 2010). Compare and contrast the promotional strategies used by two (2) different companies for a similar product within the category that you selected. A similar product within the companies would be sofas, because neither company directly specializes in...

Words: 3216 - Pages: 13

Free Essay

Comparing Multimedia and Design Career Fields

...Comparing Multimedia and Design Career Fields Ashley Raybuck DeVry University English 227 October 17, 2013 Table of Contents Page Introduction …………………………………………………………………………………………………2 Web Design versus Graphic Design What is the difference? .........................................................................................................3 Skill Sets……………………………………………………………………………………………...3 Work Environment Web Design………………………………………………………………………………………….4 Graphic Design……………………………………………………………………………………..5 Educational Requirements Web Design…………………………………………………………………………………………5 Graphic Design…………………………………………………………………………………….5 Projected Career Outlook Web Design…………………………………………………………………………………………6 Graphic Design…………………………………………………………………………………….6 Salary Web Design………………………………………………………………………………………...6 Graphic Design……………………………………………………………………………………6 Conclusions and Recommendations…………………………………………………………………7 References…………………………………………………………………………………………………8 Introduction When choosing a career path, it can be a bit intimidating. There is lots of information to sift through, such as salary, education needed, what skill sets are required, what is the work environment like, and the list can go on and on. It also can be a bit difficult because each person wants to make sure that not only can they support themselves or their family, but will they be happy with this choice for, sometimes, the rest of their lives? Choosing can be a difficult decision, but with the...

Words: 2083 - Pages: 9

Premium Essay

Test

...IFSM 310 Software and Hardware Infrastructure Concepts Final Assessment You must post this into your Assignments Folder no later than Sunday, March, 6 at 11:59 PM Eastern Time. LATE EXAMS WILL NOT BE ACCEPTED. By signing this exam, I confirm that the work contained on this exam is my own, I have received no outside assistance and have properly cited and referenced any external research that has been incorporated in my answers. I have fully complied with UMUC's Policy on Academic Dishonesty and Plagiarism (Policy 150.25). I understand that failure to properly credit my research sources is a violation of this policy. ____Vincent Wang_________________________________ (Typed signature represents actual signature) Exams without signature will not be accepted Information & Instructions * This is an individual assignment. You must work on your own. * The Final Assessment is valued at 20 points. * There 10 assessment items valued at 2 points each. * You have 72 hours to complete the Final Assessment. * Place your responses under each assessment item. * Some external research is required. You must include the appropriate APA format references after your response. * Do not just copy and paste materials. You must write complete mini essays that express your response in your own words with as much original thought as possible. * You must post the completed Final Assessment by the due date shown in the Course Schedule...

Words: 2497 - Pages: 10

Premium Essay

Huffman Trucking

...Huffman Trucking Disaster Recovery Plan CMGT/410 Huffman Trucking Disaster Recovery Plan Huffman Trucking is a privately held national company with six hundred million dollars a year in revenues. The company has hubs in Los Angeles, California; St. Louis, Missouri; Cleveland, Ohio; and Bayonne, New Jersey. The company maintains a truck maintenance facility at the hub in Cleveland, Ohio. Each hub maintains a data center, linked to the corporate offices through various Internet access methods. Recent reports of computer hacking and database corruption have highlighted the need for a coordinated data security and disaster recovery plan. A comprehensive corporate-wide strategy for data security, site backup, and disaster recovery will allow the company to continue to function and communicate during emergencies that involve any of the company’s data hubs and minimize effect on company operations. Huffman Trucking Disaster Recovery Plan Project Objectives “On August 28, 2005, Hurricane Katrina hit the southern coast of the United States with devastating effect. It was reported that more than 1800 people lost their lives and more than $81 billion dollars in damages occurred” (United States Department of Health and Human Services, 2005). Emergencies and disasters can happen at any time. Planning for disasters takes time. According to Krugman (2006), “even after three months, there was still not a reconstruction plan, let alone a plan under way.” The main purpose of a...

Words: 1801 - Pages: 8

Premium Essay

Nt1310 Unit 6 Case Study

...infinite cannot control the congestion. Agree or disagree? Elaborate briefly (60-100 words) I agree with the above statement because in the end it is the physical properties of the the medium on which you are transmitting that ultimately decides how much total traffic , congested or not. Therefore a router could have infinite memory, but its memory would have more congestion control capacity then the physical medium would allow to put through the medium. So for this reason I Agree with the above statement. 2. Compare the following: Flow Control vs Congestion Control Flow control is based from the receiving side. It makes sure that the sender only sends what it can handle (R1) Congestion Control is making...

Words: 893 - Pages: 4