Virtual Local Area Networks (VLANs) Good Practice Guideline

Size: px
Start display at page:

Download "Virtual Local Area Networks (VLANs) Good Practice Guideline"

Transcription

1 Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG Prog. Director Mark Ferrar Status Approved Owner James Wood Version 2.0 Author Mike Farrell Version Date 19/03/2009 Virtual Local Area Networks (VLANs) Good Practice Guideline Crown Copyright 2009

2 Amendment History: Version Date Amendment History /10/2005 First draft for comment /01/2006 Second Draft for Comment (In light of RFC2119) /02/2006 Technical Author /03/2006 Approved /02/2009 Document re-written and updated to latest template /03/2009 Incorporating changes suggested by CfH Infrastructure Security Team /03/2009 Incorporating changes suggested by CfH Infrastructure Security Team /03/2009 Incorporating changes suggested by Head of IT Security. Approved for release Forecast Changes: Anticipated Change When Annual Review March 2010 Reviewers: This document must be reviewed by the following: Name Signature Title / Responsibility Date Version Infrastructure Security Team James Wood Head of IT Security Approvals: This document must be approved by the following: Name Signature Title / Responsibility Date Version James Wood Head of IT Security 2.0 Distribution: NHS Connecting for Health Information Governance Website Document Status: This is a controlled document. Whilst this document may be printed, the electronic version maintained in FileCM is the controlled copy. Any printed copies of the document are not controlled. Crown Copyright 2009 Page 2 of 17

3 Related Documents: These documents will provide additional information. Ref no Doc Reference Number Title Version 1 NPFIT-SHR-QMS-PRP-0015 Glossary of Terms Consolidated.doc Latest 2 NPFIT-FNT-TO-IG-GPG-0033 Glossary of Security Terms ( rasec/gpg) Latest Glossary of Terms: List any new terms created in this document. Mail the NPO Quality Manager to have these included in the master glossary above [1]. Term Acronym Definition Crown Copyright 2009 Page 3 of 17

4 Contents 1 About this Document Purpose Audience Content Disclaimer Introduction Background Networks Local Area Networks VLANs Types of VLANs: Port, MAC Address and Protocol Based Port Based VLANs Media Access Control (MAC) Address based VLANs Protocol Based VLANs The Main Advantages of VLANs The Secure Deployment of VLANs Physical Security Network Monitoring VLAN Trunking Restrictions Private VLANs (PVLANs) VLAN Access Control Lists (VACLs) Dynamic VLANs Some Common Attacks/Vulnerabilities of VLANs MAC Flooding Attack Q and ISL Tagging Attack Double Encapsulated 802.1Q/Nested VLAN Attack Address Resolution Protocol (ARP) Attacks Private VLAN Attack Multicast Brute Force Attack Spanning-tree Attack Random Frame Stress Attack VTP Domain Configuration VTP Mode VTP security Crown Copyright 2009 Page 4 of 17

5 1 About this Document 1.1 Purpose The purpose of this document is to offer advice and guidance relating to the successful deployment of Virtual Local Area Networks (VLANs) in NHS or other healthcare environments. Detailed technical knowledge of the techniques presented is not required. Guidance includes: - The types of VLANS available and their various advantages. How to secure and defend a VLAN from attacks and other vulnerabilities. 1.2 Audience This document has been written for readers within any NHS or healthcare provider organisation, who have a general familiarity with IT applications and infrastructure issues. 1.3 Content This document comprises the following sections / topics: - Introduction Networks particularly Local Area Networks Types of VLANs The Main Advantages of VLANs The Secure Deployment of VLANs Some Common Attacks/Vulnerabilities of VLANs VTP Domain Configuration Crown Copyright 2009 Page 5 of 17

6 1.4 Disclaimer Reference to any specific commercial product, process or service by trade name, trademark manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favouring by NHS Connecting for Health. The views and opinions of authors expressed within this document shall not be used for advertising or product endorsement purposes. Any party relying on or using any information contained in this document and/or relying on or using any system implemented based upon information contained in this document should do so only after performing a risk assessment. It is important to note that a risk assessment is a prerequisite for the design of effective security countermeasures. A correctly completed risk assessment enables an NHS organisation to demonstrate that a methodical process has been undertaken which can adequately describe the rationale behind any decisions made. Risk assessments should include the potential impact to live services of implementing changes. This means that changes implemented following this guidance are done so at the implementers risk. Misuse or inappropriate use of this information can only be the responsibility of the implementer. Crown Copyright 2009 Page 6 of 17

7 2 Introduction The following information provides a knowledge-based framework that will help maintain good practice values within an organisation. The guidance within this document is written to reflect good practice, and, by following it, some of the consequences of non-compliance should be avoided. After reading this document the reader should understand: - The basics of VLANs, the various types of VLANs and their advantages, as well as any shortcomings in terms of security. Good practice for any NHS or healthcare provider organisation implementing VLANS within its network. This document will concern itself with Ethernet, as it is the most common type of LAN. 2.1 Background N3 is a private Wide Area Network (WAN) and access is therefore strictly limited to authorised endpoints. Any organisation wishing to connect to N3 is responsible for ensuring that their N3 connection does not compromise the security measures already in place within the WAN. N3 is a private network accommodating thousands of PCs, servers, printers and other items of equipment all acting as the nodes or endpoints within the network. The confidentiality of sensitive information transmitted unencrypted within N3 is not assured. However all National Applications encrypt data using Transport Layer Security (TLS) or an equivalent security standard. It is therefore advisable that the appropriate measures are taken with Existing Systems to ensure that sensitive data is secure before connecting to N3. N3 faces numerous potential threats to security, possibly from inadequately protected partner networks, or connections to uncontrolled external networks such as the Internet. These threats are continually evolving in both strength and frequency. Therefore ongoing vigilance against these threats, and the maintenance of strict security standards, are essential to the continuing success of N3. Crown Copyright 2009 Page 7 of 17

8 3 Networks A local network in its basic form is a collection of computers, printers, servers and other devices all communicating with each other over a shared system. There are various types of wired network, broadly grouped into the following three main categories: - Local Area Network (LAN). Metropolitan Area Network (MAN). Wide Area Network (WAN). This document is concerned with Local Area Networks (LANs). 3.1 Local Area Networks A Local Area Network (LAN) is a network of computers and other components located relatively close together in a limited area. LANs operate at layer-2 of the Open Systems Interconnect (OSI) model, and can vary widely in size. They can consist of only two computers in a home office or small business, or include hundreds of computers in a large corporate or healthcare environment. A small home business or a small office environment could use a small Ethernet LAN to connect two or more computers, and to connect the computers to one or more shared peripheral devices, such as a printer. A large corporate or healthcare site could use multiple LANs to accommodate hundreds (if not thousands) of computers and shared peripheral devices within a location. A shared LAN comprises a single broadcast domain, where stations connect to each other by means of a hub or repeater. It is also a single collision domain, as data frames transmitted on the LAN are received by all stations. As the amount of traffic increases so does the number of collisions, which severely limits the efficiency of this type of legacy LAN. With the advent of Ethernet LAN switches each station can be connected to a single port, which is itself a single collision domain. However a flat LAN comprising a LAN switch (or inter-connected multiple LAN switches) is still a single broadcast domain, which is invariably an inefficient method of networking users within a large site. Crown Copyright 2009 Page 8 of 17

9 4 VLANs Large corporate environments, and for that matter healthcare sites, comprise multiple departments which can be segmented into separate layer-2 LANs. An efficient and cost effective means of accomplishing this is through the use of interconnected Virtual Local Area Networks (VLANs). A VLAN comprises a single broadcast domain and is a logical segmentation of stations, independent of the physical connections. This allows LAN switch ports within a building or campus to be logically assigned to a particular layer-2 VLAN, with individual VLANs inter-connected at layer-3 by one or more routers. VLANs address issues such as scalability, security and network management. Routers in VLAN topologies provide broadcast filtering, security, address summarisation, and traffic flow management. By using VLANs, one can control traffic patterns and react quickly to relocations. They provide the flexibility to adapt to changes in network requirements and allow for simplified administration. NB: It should be noted however that, although VLAN s have their place, it is good practice to utilise physical LANs for more risky environments such as firewall Demilitarized Zones (DMZs). Crown Copyright 2009 Page 9 of 17

10 5 Types of VLANs: Port, MAC Address and Protocol Based 5.1 Port Based VLANs In a port based VLAN a particular VLAN is assigned individual ports of a LAN switch (or inter-connected multiple switches). This makes troubleshooting of port based VLANs easier, as the assignment of VLANs to particular physical ports is known. A station can be moved from one VLAN to another by simply being moved to a different switch port 5.2 Media Access Control (MAC) Address based VLANs Using this method LAN switches maintain tables of Media Access Control (MAC) addresses, and their VLAN membership. With this form of membership stations on a shared segment can be assigned to different VLANs. This layer-2 VLAN definition has the advantage of portability, as whenever a station is plugged into the LAN the switches will recognise that it is a member of a particular LAN The disadvantage of MAC address based solutions is the requirement that all stations must be initially configured to be in at least one VLAN. The automatic VLAN grouping of users is only possible after this initial manual configuration. The disadvantage of having to configure VLAN membership becomes apparent in very large local networks where hundreds (and possibly thousands) of users and shared resources must be explicitly assigned to a particular VLAN. The major security issue with this type of VLAN is that a malicious user can reconfigure his/her system with a different MAC address, and therefore access another VLAN. 5.3 Protocol Based VLANs Sometimes called Layer-3 Based VLANs. With this method computers are assigned to VLANs by using the protocol that is in use, and the Layer-3 address. For example, this solution enables an Internetwork Packet Exchange (IPX) network or a particular Internet Protocol (IP) subnet to have its own VLAN. It is also possible to define VLANs based on applications, service or any other combination. For example, File Transfer Protocol (FTP) applications could execute on one VLAN and other applications on another. Crown Copyright 2009 Page 10 of 17

11 There are several advantages to defining VLANs at layer-3: - It enables partitioning by protocol type, which may be an attractive option to network managers who are dedicated to a service or application based VLAN strategy. A user can physically move his/her computer without having to reconfigure its network address. A benefit primarily for Transmission Control Protocol/Internet Protocol (TCP/IP) users. Defining VLANs at layer-3 can eliminate the need for frame tagging in order to communicate VLAN membership between LAN switches, reducing transport overhead. One of the disadvantages of Protocol Based VLANs (versus MAC or Port Based VLANs) can be performance. Inspecting layer-3 addresses in packets is more processor intensive than looking at MAC addresses in frames. Therefore switches that use layer-3 information for VLAN definition are generally slower than those that use layer-2 information. 6 The Main Advantages of VLANs By grouping users into VLANs, broadcast traffic is confined to each VLAN. This frees up resources which otherwise would have to process this traffic. It is easy to change or modify logical groups because they are independent of physical constraints. It is easy to manage large networks because configurations can be undertaken centrally. It is easy to configure or modify the network according to business needs. E.g. creating separate VLANs for each department within an organisation. The streamlining of network resources, like IP subnets and servers, makes the network easy to manage and more elegant. Applying policies/changes to VLANs, and VLAN based resources, also helps to improve the daily operation of the network, and reduces the network administrator s workload. As VLANs put end users into logical domains, it is easier to apply security policies to these groups as a whole. This helps to improve the overall security of the network. However it is extremely inadvisable for a network administrator to rely on VLANs as the only security safeguard. Crown Copyright 2009 Page 11 of 17

12 7 The Secure Deployment of VLANs The primary downfall with VLAN security is incorrect configuration. Due to the nature of VLAN s there are vast configuration options, each with the ability to increase the networks susceptibility to data theft or network subversion. Simple measures, such as configuring hosts to be in a VLAN separate to the native VLAN, circumvent the vulnerability to major attacks. 7.1 Physical Security With physical access to the console port of a LAN switch, an unauthorised party could potentially reconfigure the switch and gain access to sensitive data. It is therefore recommended that LAN switches are housed in secure environments. I.e. inside a locked cabinet, within a secure comms room if possible 7.2 Network Monitoring A correctly monitored network can give warning of a number of network security violations, including a physical security breach. A dual approach should be taken, utilising alerts from the device and details polled from the management console. Simple Network Management Protocol (SNMP) traps should notify the management console of any configuration updates, whilst continual polling and verification of the VLAN databases ensure that no hosts end up on the wrong network. Also polling the MAC-address table, on a per VLAN/switch basis, can be used as a final check that all hosts are on the correct network. 7.3 VLAN Trunking Restrictions One method of minimising the risk of incorrect VLAN association is to restrict the VLAN IDs that are trunked to edge devices. For example, a VLAN carrying sensitive data should not be trunked around a local network, unnecessarily traversing switches where none of its hosts are connected. Crown Copyright 2009 Page 12 of 17

13 7.4 Private VLANs (PVLANs) A VLAN is a broadcast domain where all hosts assigned to it can talk with other hosts on the same VLAN. Private VLANs allow segmentation of traffic at the data link layer (layer-2) of the Open Systems Interconnect (OSI) model. This limits the size of the broadcast domain. There are three different modes for configuring ports in a Private VLAN: - Promiscuous Mode: Ports in this mode can talk to any port. Isolated Mode: Ports in this mode can talk only to promiscuous ports. PVLANs block all traffic to isolated ports except from promiscuous ports. Community Mode: Ports in this mode can talk between themselves and with promiscuous ports. In PVLANs promiscuous ports are termed primary VLANs, and the community and isolated ports are the secondary VLANs. A PVLAN has one primary VLAN but may have more than one secondary VLAN. PVLANs are usually deployed in the Demilitarized Zone (DMZ), where the servers usually need to talk to external connections, as well as internal ones, but hardly ever need to communicate with other servers on the DMZ. It therefore acts as an effective security method of segregating servers within a VLAN. 7.5 VLAN Access Control Lists (VACLs) VLAN Access Control Lists (VACLs) provide access control for all packets that are bridged within a VLAN, or that are routed into and out of the VLAN. Enforcement takes place at wire speed hence there is no performance penalty. VACLs can be mapped separately to primary or secondary VLANs. 7.6 Dynamic VLANs By using the MAC address of the device connected to the port of a LAN switch, and by deploying a VLAN Membership Policy Server (VMPS), LAN switch ports can be dynamically assigned to VLANs. When a host moves from one port on a LAN switch to another in the network, VMPS helps to assign the new port to the proper VLAN. Crown Copyright 2009 Page 13 of 17

14 8 Some Common Attacks/Vulnerabilities of VLANs 8.1 MAC Flooding Attack LAN switches have a limit on the number of MAC address to physical port assignments that they can store in their tables. By flooding such a switch and exploiting this limit, the attack can cause the switch to enter failopen mode, allowing all incoming packets to be broadcasted to all the ports. This helps the attacker to sniff all traffic and to perform attacks like Address Resolution Protocol (ARP) poisoning. The use of LAN switch port security, dynamic VLANs and 802.1x can help prevent these attacks Q and ISL Tagging Attack These attacks allow a user within a VLAN unauthorised access to another VLAN, by altering the Inter-Switch Link (ISL) 1 or 802.1Q tag. Tagging attacks are one of the most dangerous attacks within a switching security infrastructure. It is also one of the most easy to miss when configuring a switch. Leaving a port with default configuration and not shut down opens up all VLANs that are trunked to/through the switch to unauthorised access. An attacker is able to send Dynamic Trunking Protocol (DTP) traffic to the switch to trick the port into thinking that it is talking to another switch or dot1q device. The attacker can then craft their packets to whichever VLAN they want. In effect it is giving them complete access to any VLAN. 2 Setting Dynamic Trunking Protocol (DTP) to the off state, on all nontrusted ports, should provide protection from this kind of attack. Also unused ports should always be shut down 1 Cisco proprietary 2 VLAN Security in the LAN and MAN Environment. Chris Hoffmann. 27 April 2003 Crown Copyright 2009 Page 14 of 17

15 8.3 Double Encapsulated 802.1Q/Nested VLAN Attack If possible, using the native VLAN should be avoided, because the identification and classification are lost during processing over 802.1Q trunks. By using double-encapsulated 802.1Q packets through the native VLAN of a trunk, the outer tag of the VLAN is stripped during processing. This makes the internal tag the permanent VLAN identifier, which in turn allows the packet to hop across VLANs. This method of VLAN Hopping can be easily defended against by never having the native trunk VLAN configured on a port. In a switch spoofing attack, an attacking host imitates a trunking switch by mimicing the VLAN tagging and trunking protocols used. Traffic for multiple VLANs is then accessible to the attacking host. Good practice against this type of attack or misconfiguration is to clear the native VLAN from all 802.1Q trunks. If clearing the native VLAN is not possible then an unused VLAN should be utilised as the native VLAN. 8.4 Address Resolution Protocol (ARP) Attacks Address Resolution Protocol (ARP) tables map IP addresses to MAC addresses. Unfortunately a problem with ARP is that it introduces a potential security risk resulting from ARP spoofing. For example, an attacker can fool a station by sending a fictitious ARP response from a rogue network device that includes the IP address of a legitimate network device, and the MAC address of the rogue device. This causes all legitimate stations on the network to automatically update their ARP tables with the false mapping. Of course these stations will then send future packets to the rogue device rather than the legitimate access point or router. This is a classic man-in-the-middle attack, which enables an attacker to manipulate user sessions. As a result the attacker could potentially obtain passwords, capture sensitive data, and even interface with corporate servers as if they were the legitimate user. The use of LAN switch port security can help prevent these attacks, by allowing only one MAC address for each physical port on the switch. This feature prevents attackers from changing the MAC address of their machine, or from trying to map more than one MAC address to their machine Crown Copyright 2009 Page 15 of 17

16 8.5 Private VLAN Attack Private VLANs only isolate traffic at Layer-2. However if a router is attached to a PVLAN promiscuous port, it forwards all Layer-3 traffic received on that port to whatever destination it is meant for. This effectively enables two hosts in an isolated VLAN (which cannot communicate directly at Layer-2) to talk to each other using the Layer-3 packet relay provided by the router. Cisco will argue that this is not a vulnerability, but rather the expected behaviour of the feature 8.6 Multicast Brute Force Attack In this type of attack Layer-2 multicast frames are flooded to the LAN switch, in an attempt to exploit the potential vulnerabilities in the switch to leak frames from one VLAN to other VLANs. 3 Cisco report 3 their tests show that this type of attack has proved ineffective against their Catalyst switches, because all frames were correctly contained within their appropriate broadcast domain. 8.7 Spanning-tree Attack In this type of attack the attacker tries to exploit bugs in the spanning-tree protocol (STP), by sniffing ports to ascertain the ID of the port STP is transmitting on. An attacker can then try to send out packets announcing that he is the new root bridge, with a much lower priority Cisco report 3 that their tests failed to discover any possible VLAN leaks in their switches. 8.8 Random Frame Stress Attack In this type of attack the source and destination address are kept constant, and other fields of the packet are randomly varied to see if VLANs can be hopped. PVLANs provide protection from these types of attacks by containing traffic. Cisco report 3 that their tests showed no packets were found to have successfully hopped VLANs 3.. shtml#wp39271 Crown Copyright 2009 Page 16 of 17

17 9 VTP Domain Configuration VLAN Trunking Protocol (VTP) is a Cisco proprietary Layer 2 messaging protocol that is used to keep VLAN information consistent across the entire switching architecture. If you add a VLAN to one switch VTP will make sure that the VLAN details are correctly propagated to all switches in the VTP Domain. 9.1 VTP Mode One switch within the Cisco local network needs to be defined as the VTP server. All other switches in the local network then need to be configured as clients. By default a switch acts as a VTP server. 9.2 VTP security It is recommended that a VTP password is configured for the VTP domain to prevent the possibility of spoofed VTP packets adding/deleting VLAN information. Within the Cisco local network an MD5 hashed password can be set for the VTP domain to provide authentication of VTP packets. VTP pruning can be configured within the Cisco local network to prune unneeded VLANs from trunk links. This enables a more efficient use of trunk bandwidth, and can also be considered as a good security feature. However, these features should not conceal the fact that it is very risky to use VTP in sensitive environments. Crown Copyright 2009 Page 17 of 17

Network Address Translation (NAT) Good Practice Guideline

Network Address Translation (NAT) Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0011.06 Prog. Director Chris Wilber Status Approved Owner James Wood Version 2.0 Author Mike Farrell

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Proxy Services: Good Practice Guidelines

Proxy Services: Good Practice Guidelines Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance Prog. Director Mark Ferrar Owner Tim Davis Version 1.0 Author James Wood Version Date 26/01/2006 Status APPROVED Proxy Services:

More information

Implementation of Virtual Local Area Network using network simulator

Implementation of Virtual Local Area Network using network simulator 1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,

More information

Site to Site Virtual Private Networks (VPNs):

Site to Site Virtual Private Networks (VPNs): Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0

More information

Secure Use of the New NHS Network (N3): Good Practice Guidelines

Secure Use of the New NHS Network (N3): Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0003.01 Prog. Director Mark Ferrar Status Approved Owner Tim Davis Version 1.0 Author Phil Benn Version

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

Use of tablet devices in NHS environments: Good Practice Guideline

Use of tablet devices in NHS environments: Good Practice Guideline Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R

VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R Executive Summary The virtual switches in ESX Server 3 support VLAN (IEEE 802.1Q) trunking. Using VLANs, you can enhance security and leverage

More information

Securing end devices

Securing end devices Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security

More information

- Virtual LANs (VLANs) and VTP -

- Virtual LANs (VLANs) and VTP - 1 - Virtual LANs (VLANs) and VTP - Collision vs. Broadcast Domains A collision domain is simply defined as any physical segment where a collision can occur. Hubs can only operate at half-duplex, and thus

More information

How To Configure Voice Vlan On An Ip Phone

How To Configure Voice Vlan On An Ip Phone 1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices

More information

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Intrusion Detection and Prevention Systems (IDS/IPS) Good Practice Guide

Intrusion Detection and Prevention Systems (IDS/IPS) Good Practice Guide Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-INFR-0068.01 Prog. Director Mark Ferrar Status Approved Owner James Wood Version 2.0 Author Jason Alexander

More information

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY CHAPTER 6 DESIGNING A NETWORK TOPOLOGY Expected Outcomes Able to identify terminology that will help student discuss technical goals with customer. Able to introduce a checklist that can be used to determine

More information

LAN Switching and VLANs

LAN Switching and VLANs 26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Troubleshooting an Enterprise Network

Troubleshooting an Enterprise Network Troubleshooting an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 9 Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright Cisco

More information

Executive Summary. AUGUST 2002 Secure Use of VLANs: An @stake Security Assessment

Executive Summary. AUGUST 2002 Secure Use of VLANs: An @stake Security Assessment R e s e a r c h R e p o r t @stake consultants David Pollino and Mike Schiffman, CISSP, conducted the testing and analysis. Mr. Pollino is the Director of the Wireless Center of Excellence at @stake. He

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group ofir@sys-security.com http://www.sys-security.com September 2002

More information

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,

More information

vsphere Security Update 1 ESXi 5.0 vcenter Server 5.0 EN-000789-01

vsphere Security Update 1 ESXi 5.0 vcenter Server 5.0 EN-000789-01 Update 1 ESXi 5.0 vcenter Server 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

LANs and VLANs A Simplified Tutorial

LANs and VLANs A Simplified Tutorial Application Note LANs and VLANs A Simplified Tutorial Version 3.0 May 2002 COMPAS ID 90947 Avaya Labs 1 Companion document IP Addressing: A Simplified Tutorial COMPAS ID 92962 2 Introduction As the name

More information

Switching in an Enterprise Network

Switching in an Enterprise Network Switching in an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Compare the types of

More information

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port 1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

Network Security Topologies. Chapter 11

Network Security Topologies. Chapter 11 Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network

More information

Exploiting First Hop Protocols to Own the Network. Rocket City TakeDownCon 2015. Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin

Exploiting First Hop Protocols to Own the Network. Rocket City TakeDownCon 2015. Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin Exploiting First Hop Protocols to Own the Network Rocket City TakeDownCon 2015 Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin www.dynetics.com V## Goes Here 1 OSI and TCP/IP Model OSI

More information

Building Secure Network Infrastructure For LANs

Building Secure Network Infrastructure For LANs Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives

More information

Protecting VMs in a Multi-Tenancy Environment

Protecting VMs in a Multi-Tenancy Environment Protecting VMs in a Multi-Tenancy Environment Prepared by: XenServer Engineering www.citrix.com Table of Contents 1. Executive Summary... 3 2. Introduction... 4 3. Preventing Vulnerabilities with XenServer...

More information

E-Mail, Calendar and Messaging Services Good Practice Guideline

E-Mail, Calendar and Messaging Services Good Practice Guideline E-Mail, Calendar and Messaging Services Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0017.01 Prog. Director Mark Ferrar Status

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Network Security. Ensuring Information Availability. Security

Network Security. Ensuring Information Availability. Security Ensuring Information Availability Security - Ensuring Information Availability Introduction The advent of the Internet and the huge array of connected devices has led to an insatiable demand for access

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

HANDBOOK 8 NETWORK SECURITY Version 1.0

HANDBOOK 8 NETWORK SECURITY Version 1.0 Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: assist@dsd.gov.au HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

How To Build A Network Security Network

How To Build A Network Security Network Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0031.06 Prog. Director Mark Ferrar Status Approved Owner James Wood Version 1.0 Author Mike Farrell

More information

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) 4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1 NETE-4635 Computer Network Analysis and Design Designing a Network Topology NETE4635 - Computer Network Analysis and Design Slide 1 Network Topology Design Themes Hierarchy Redundancy Modularity Well-defined

More information

Guideline on Firewall

Guideline on Firewall CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Georgia College & State University

Georgia College & State University Georgia College & State University Milledgeville, GA Domain Name Service Procedures Domain Name Service Table of Contents TABLE OF REVISIONS... 3 SECTION 1: INTRODUCTION... 4 1.1 Scope and Objective...

More information

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Document ID: 69632 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure

More information

Avaya G700 Media Gateway Security - Issue 1.0

Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise

More information

MUNICIPAL WIRELESS NETWORK

MUNICIPAL WIRELESS NETWORK MUNICIPAL WIRELESS NETWORK May 2009 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

DDoS Protection Technology White Paper

DDoS Protection Technology White Paper DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of

More information

White Paper. Using VLAN s in Network Design. Kevin Colo

White Paper. Using VLAN s in Network Design. Kevin Colo White Paper Using VLAN s in Network Design Kevin Colo December, 2012 1. Background To this day, end users still ask if VLANs (Virtual LANs) are a fundamentally secure technique for isolating networks.

More information

Interconnecting Cisco Networking Devices Part 2

Interconnecting Cisco Networking Devices Part 2 Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course

More information

Introduction to Networking

Introduction to Networking 1 CHAPTER ONE Introduction to Networking Objectives 2.3 Identify common physical network topologies. Star. Mesh. Bus. Ring. Point to point. Point to multipoint. Hybrid 2.7 Explain common logical network

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

The IP Transmission Process. V1.4: Geoff Bennett

The IP Transmission Process. V1.4: Geoff Bennett The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks

More information

- Hubs vs. Switches vs. Routers -

- Hubs vs. Switches vs. Routers - 1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

More information

This chapter covers the following topics:

This chapter covers the following topics: This chapter covers the following topics: Components of SAFE Small Network Design Corporate Internet Module Campus Module Branch Versus Headend/Standalone Considerations for Small Networks C H A P T E

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

How To Protect Information At De Montfort University

How To Protect Information At De Montfort University Network Security Policy De Montfort University January 2006 Page 1 of 18 Contents 1 INTRODUCTION 1.1 Background... 1.2 Purpose and Scope... 1.3 Validity... 1.4 Assumptions... 1.5 Definitions... 1.6 References..

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ

More information

Cisco Networking Professional-6Months Project Based Training

Cisco Networking Professional-6Months Project Based Training Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH

More information

VOICE OVER IP SECURITY

VOICE OVER IP SECURITY VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Patch Management Good Practice Guideline

Patch Management Good Practice Guideline Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-INFR-0069.01 Prog. Director Chris Wilber Status Approved Owner James Wood Version 1.0 Author Gary Croft Version

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved. Configuring Single Instance Rapid Spanning Tree Protocol (RSTP) between an Avaya C360 Converged Switch and HP ProCurve Networking Switches to support Avaya IP Telephony Issue 1.0 Abstract These Application

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre

More information

NOS for Network Support (903)

NOS for Network Support (903) NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure

More information

Own your LAN with Arp Poison Routing

Own your LAN with Arp Poison Routing Own your LAN with Arp Poison Routing By: Rorik Koster April 17, 2006 Security is a popular buzzword heard every day throughout our American culture and possibly even more so in our global economy. From

More information

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING 20 APRIL 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to

More information

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

CCNA Exploration: Accessing the WAN Chapter 7 Case Study

CCNA Exploration: Accessing the WAN Chapter 7 Case Study Objectives: Mitigate attacks based on DHCP rogue servers. Intro: ChurchBells Inc. is having connectivity issues and needs your help. The Scenario: According to the reports, some user PCs within the company

More information

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Document ID: 91672 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security

More information

How To Configure InterVLAN Routing on Layer 3 Switches

How To Configure InterVLAN Routing on Layer 3 Switches How To Configure InterVLAN Routing on Layer 3 Switches Document ID: 41860 Contents Introduction Prerequisites Requirements Components Used Conventions Configure InterVLAN Routing Task Step by Step Instructions

More information

Implementing Cisco IOS Network Security

Implementing Cisco IOS Network Security Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles

More information

640-816: Interconnecting Cisco Networking Devices Part 2 v1.1

640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 Course Introduction Course Introduction Chapter 01 - Small Network Implementation Introducing the Review Lab Cisco IOS User Interface Functions

More information

8. Firewall Design & Implementation

8. Firewall Design & Implementation DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or

More information

Avaya TM G700 Media Gateway Security. White Paper

Avaya TM G700 Media Gateway Security. White Paper Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

IPv6 First Hop Security Protecting Your IPv6 Access Network

IPv6 First Hop Security Protecting Your IPv6 Access Network IPv6 First Hop Security Protecting Your IPv6 Access Network What You Will Learn This paper provides a brief introduction to common security threats on IPv6 campus access networks and will explain the value

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects

More information

Universal Network Access Policy

Universal Network Access Policy Universal Network Access Policy Purpose Poynton Workmens Club makes extensive use of network ed Information Technology resources to support its research and administration functions and provides a variety

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information