Project Network Design

Table of Content

The best web design to guarantee the security of Corporation Techs internal entree while retaining public Web site handiness consists of several beds of defence in order to protect the corporation’s informations and supply handiness to employees and the populace. The private-public web border is considered peculiarly vulnerable to invasions. because the Internet is a publically accessible web and falls under the direction horizon of multiple web operators. For these grounds. the Internet is considered an untrusted web. So are wireless LANs. which-without the proper security steps in place-can be hijacked from outside the corporation when wireless signals penetrate interior walls and spill out-of-doorss. The web substructure is the first line of defence between the Internet and public facing web waiters. Firewalls provide the first line of defence in web security substructures. They accomplish this by comparing corporate policies about users’ web entree rights to the connexion information environing each entree effort.

User policies and connexion information must fit up. or the firewall does non allow entree to web resources ; this helps avert housebreakings. Network firewalls maintain communications between internal web sections in cheque so that internal employees can non entree web and information resources that corporate policy dictates are out-of-bounds to them. By partitioning the corporate intranet with firewalls. sections within an organisation are offered extra defences against menaces arising from other sections. In computing machine webs. a DMZ ( demilitarized zone ) is a computing machine host or little web inserted as a “neutral zone” between a company’s private web and the outside public web. It prevents outside users from acquiring direct entree to a waiter that has company informations. A DMZ is an optional and more unafraid attack to a firewall and efficaciously acts as a proxy waiter every bit good. Security is the bosom of internetworking.

This essay could be plagiarized. Get your custom essay
“Dirty Pretty Things” Acts of Desperation: The State of Being Desperate
128 writers

ready to help you now

Get original paper

Without paying upfront

The universe has moved from an Internet of inexplicit trust to an Internet of permeant misgiving. In web security. no package can be trusted ; all packages must gain that trust through a web device’s ability to inspect and implement policy. Clear text ( unencrypted information ) services represent a great failing in webs. Clear text services transmit all information or packages. including user names and watchwords. in unencrypted format. Servicess such as file transportation protocol ( FTP ) . electronic mail. telnet and basic HTTP hallmark all transmit communications in clear text. A hacker with a sniffer could easy capture user names and watchwords from the web without anyone’s cognition and addition decision maker entree to the system. Clear text services should be avoided ; alternatively secure services that encrypt communications. such as Secure Shell ( SSH ) and Secure Socket Layer ( SSL ) . should be used.

The usage of routers and switches will let for web cleavage and assist support against whiffing Corporation Tech may desire to hold their ain web or e-mail waiter that is accessible to Internet users without holding to travel to the disbursal and complexness of constructing a DMZ or other web for the exclusive intent of hosting these services. At the same clip they may desire to host their ain waiter alternatively of outsourcing to an ISP ( Internet Service Provider ) or hosting company. Corporation Tech can utilize NAT ( Network Address Translation ) to direct inbound traffic that matches pre-defined protocols to a specific waiter on the internal or private LAN. This would let Corporation Tech to hold a individual fixed public IP reference to the Internet and utilize private IP references for the web and electronic mail waiter on the LAN.

Network Diagram and Vulnerabilities

Network substructure utilizing Class C web reference 192. 168. 1. 0. The Main Servers utilizing Virtual Machine package was configured with a inactive IP reference of 192. 168. 50. 1. This waiter controls DHCP. DNS and Active Directory. The Web Server is located outside the web in the DMZ. Internal web is configured on separate VLAN’s to divide section traffic and manage informations entree. Cisco Internal firewall was installed and configured to pull off the internal web on the LAN. The Cisco firewall 2 implemented to pull off distant traffic come ining the LAN.

This provides superimposed security to the web. Several ports have been identified as exposures in the Corporation Techs web that allowed information to be transferred via clear text and as such they have been closed. Extra ports that could be used for bet oning. cyclosis and Peer to Peer have been blocked or closed to cut down unauthorised entree to the web. All ports known to be used for malicious intents have been closed as a affair of best patterns. All standard ports that do non hold specific applications necessitating entree have been closed. The ports listed below are standard ports that have been blocked to minimise unauthorised package transportation of clear text:

Port 21 – FTPPort 23 -TelnetPort 110 – POP3Port 80 – Basic HTTPHardening PracticesDevelop a baselineNear all fresh PortsRedirect traffic to procure ports illustration HTTPS ( 443 ) or higher Configure Firewall to let or deny secure trafficInstall IDS and IPSReview proctor logs on the web and comparison to baseline for any invasions PoliciesDevelop and Implement web Acceptable User policy ( AUP ) which must be signed before utilizing the web Assign Permissions and RightsPassword Policy must be in topographic point on all devices and enforceEnd Users must be trained about the different menaces faced on the web Back Up must be done hebdomadal and notify usersMaintain Bandwidth velocity and proctor extremum hoursNetwork Security realignment done utilizing Class C web reference 192. 168. 1. 0.













The Servers was configured on web reference 192. 168. 1. 216 inactive and 192. 168. 1. 218 for simpleness. DHCP. DNS and Active Directory were install and configured on one of the waiter. The 2nd waiter was usage for the Application. Both PC’s were besides configured on the same web reference 192. 168. 1. 0 for easy direction on the switch. The switch was configured with 192. 168. 1. 200 inactive IP reference. Router web reference was changed to avoid conflicting references and easy direction. Cisco Internal firewall 1 was installed and configured to pull off the internal web on the LAN. The Cisco firewall 2 implemented to pull off distant traffic come ining the LAN. This provides superimposed security to the web.

MentionsCisco. ( n. d. ) . ( Cicso ) Retrieved 10 26. 2014. from Cisco ASA 5500-X Series Next-Generation Firewalls: hypertext transfer protocol: //www. lake herring. com/c/en/us/products/security/asa-5500-series-next-generation-firewalls/index. hypertext markup language HP Support papers – HP Support Center. ( n. d. ) . Retrieved October 10. 2014. from hypertext transfer protocol: //h20565. www2. horsepower. com/portal/site/hpsc/template. PAGE/public/kb/docDisplay/ ? sp4ts. oid=412144 & A ; spf_p. tpst=kbDocDisplay & A ; spf_p. prp_kbDocDisplay=wsrp-navigationalState % 3DdocId % 253Demr_na-c02480766-2 % 257CdocLocale % 253D % 257CcalledBy % 253D & A ; javax. portlet. begCacheTok=com. sketch. cachetoken & amp ; javax. portlet. endCacheTok=com. sketch. cachetoken HP Support papers – HP Support Center. ( n. d. ) . Retrieved October 10. 2014. from hypertext transfer protocol: //h20566. www2. horsepower. com/portal/site/hpsc/template. PAGE/public/kb/docDisplay? docId=bps53634 & A ; Ac. admitted=1413144875821. 876444892. 199480143 Network Access Control. ( n. d. ) . Retrieved 10 26. 2014. from Wikipedia: hypertext transfer protocol: //en. wikipedia. org/wiki/Network_Access_Control Pascucci. M. ( 2013. August 06 ) . Security Management at the Speed of Business. Retrieved October 25. 2014. from algosec. com: hypertext transfer protocol: //blog. algosec. com/2013/08/the-ideal-network-security-perimeter-design-part-1-of-3. html Vaughan-Nichols. S. ( 2013. January 30 ) . How to repair the UPnP security holes | ZDNet. Retrieved from hypertext transfer protocol: //www. zdnet. com/how-to-fix-the-upnp-security-holes-7000010584/ Wodrich. M. ( 2009. November 10 ) . Vulnerability in Web Services on Devices ( WSD ) API – Security Research & A ; Defense – Site Home – TechNet Blogs. Retrieved from hypertext transfer protocol: //blogs. technet. com/b/srd/archive/2009/11/10/vulnerability-in-web-services-on-devices-wsd-api. aspx

Cite this page

Project Network Design. (2017, Aug 17). Retrieved from

https://graduateway.com/project-network-design-essay-2932-essay/

Remember! This essay was written by a student

You can get a custom paper by one of our expert writers

Order custom paper Without paying upfront