NAD710 – Linux Network Security   How to Protect Your Network May 25, 2002 Professor Tom Mavroidis
System Assessment  <ul><li>User Accounts </li></ul><ul><li>Access Control lists </li></ul><ul><li>Network Access Control <...
Protect the Exterior <ul><li>First you’ll need an exterior router </li></ul><ul><li>Routers come in many forms, you have t...
Why Cisco <ul><li>You would generally need a sophisticated router to be able to block unwanted incoming traffic </li></ul>...
Cisco IOS Software <ul><li>Cisco uses its IOS software to control its routers and switches. </li></ul><ul><li>This IOS sof...
Entry Level Routers <ul><li>If you don’t need such a sophisticated router you can use one of the entry level routers like ...
Perimeter Security <ul><li>Perimeter security devices inside the network are designed to control access to networks and to...
Perimeter Security <ul><li>This element provides the means to control access to critical network applications, data, and s...
Controlling who gets in <ul><li>Routers and switches with access control lists and/or stateful firewalling, as well as ded...
<ul><li>Complementary tools, including virus scanners and content filters, also help control network perimeters </li></ul>
 
Upcoming SlideShare
Loading in …5
×

Nad710 Linux Network Security

283
-1

Published on

Linux Network Security

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
283
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Nad710 Linux Network Security

  1. 1. NAD710 – Linux Network Security   How to Protect Your Network May 25, 2002 Professor Tom Mavroidis
  2. 2. System Assessment <ul><li>User Accounts </li></ul><ul><li>Access Control lists </li></ul><ul><li>Network Access Control </li></ul><ul><li>Encryption </li></ul><ul><li>Logging </li></ul><ul><li>Intrusion Detection </li></ul>
  3. 3. Protect the Exterior <ul><li>First you’ll need an exterior router </li></ul><ul><li>Routers come in many forms, you have to choose based on your needs </li></ul><ul><li>Some are basic (Linksys) </li></ul><ul><li>Others advanced (Cisco) </li></ul>
  4. 4. Why Cisco <ul><li>You would generally need a sophisticated router to be able to block unwanted incoming traffic </li></ul><ul><li>Cisco has many different lines of routers to suit any business need </li></ul>
  5. 5. Cisco IOS Software <ul><li>Cisco uses its IOS software to control its routers and switches. </li></ul><ul><li>This IOS software make Cisco routers some of the most powerful and versatile routers in the industry </li></ul>
  6. 6. Entry Level Routers <ul><li>If you don’t need such a sophisticated router you can use one of the entry level routers like Linksys, Dlink or SMC. Each come with their own proprietary configuration screens </li></ul>
  7. 7. Perimeter Security <ul><li>Perimeter security devices inside the network are designed to control access to networks and to hide data moving outside the network. There are numerous vulnerabilities inside the network. Secure networking cannot be achieved without addressing these vulnerabilities . </li></ul>
  8. 8. Perimeter Security <ul><li>This element provides the means to control access to critical network applications, data, and services so that only legitimate users and information can pass through the network. </li></ul>
  9. 9. Controlling who gets in <ul><li>Routers and switches with access control lists and/or stateful firewalling, as well as dedicated firewall appliances provide this control. </li></ul>
  10. 10. <ul><li>Complementary tools, including virus scanners and content filters, also help control network perimeters </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×