2. NETWORK
POLICIES
Network policies are sets
of conditions,
constraints, and settings
that allow you to
designate who is
authorized to connect to
the network and the
circumstances under which
they can or cannot
connect.
3. WHY IS IT IMPORTANT FOR A
NETWORK TO FOLLOW POLICIES?
A network that follows well-defined
policies capably fills business needs
that it is designed to support. Think
of network policies as objectives or
goals. Without clear objectives, your
network can't be set up to deliver
optimally, and without goals, its
performance can't be measured.
4. BUSINESS INTENT AND AGILITY
Network policies reflect business
intent. Network controllers ingest
business intent and create policies
that help achieve the desired
business outcomes. Policies are
enforced and carried out by network
equipment such as switches,
routers, wireless access points,
and wireless LAN controllers.
Networks operated in an ad hoc
fashion, without guiding policies,
will likely fail to deliver
optimally.
5. CONSISTENCY OF EXPERIENCE
Well-executed policies in the
network provide consistency of
service throughout it,
regardless of locations, means
of connectivity, or devices in
use. This means users and
things can use the network from
anywhere and still have the
same access privileges and
quality of network experience.
6. NETWORK
AUTOMATION
NETWORK DEVICES AND THEIR
OPERATIONS CAN BE BETTER
AUTOMATED WHEN GUIDANCE
EXISTS. WITH POLICIES,
CONFIGURATIONS CAN BE
AUTOMATED AND
ORCHESTRATED SO THAT EACH
DEVICE DOES WHAT'S
REQUIRED TO ACHIEVE THE
LARGER OBJECTIVES.
7. Performance Monitoring
Once well-understood goals are defined, metrics
can be established to measure how the network is
delivering. Continuous analysis of performance
helps ensure that policies are being followed
and business objectives are being met.
8. NETWORK
SECURITY
WITH POLICIES IN PLACE,
ANY VIOLATIONS CAN BE
EASIER TO DETECT.
SECURITY IS MORE EASILY
ENFORCED, THREATS MORE
QUICKLY CONTAINED, AND
RISK RAPIDLY REDUCED WITH
SECURITY-RELATED
POLICIES.
9. IT IS IMPORTANT TO
UNDERSTAND THE TYPES
OF USER ACCOUNTS AND
THE INFORMATION
NECESSARY TO CREATE
THEM.
10. USER ACCOUNTS
A user account is a record that consists
of user name and password required for the
user to log on, the groups in which the
user account belongs and the rights and
permission the user has for using the
computer and network resources. Each end
user who regularly uses a computer or the
network should have a unique user account.
12. LOCAL USER
ACCOUNT
LOCAL USER
ACCOUNTS
WHEN THIS ACCOUNT IS CREATED, THE OS
CREATES THE ACCOUNT ONLY IN THAT
COMPUTERS SECURITY DATABASE. THE OS
DOES NOT REPLICATE LOCAL USER ACCOUNT
INFORMATION TO DOMAIN CONTROLLERS.
AFTER A LOCAL USER ACCOUNT IS CREATED,
THE COMPUTER USES ITS LOCAL SECURITY
DATABASE TO AUTHENTICATE THE LOCAL
USER ACCOUNT THAT ALLOWS THE USER TO
LOG ON TO THAT COMPUTER.
13. DOMAIN USER ACCOUNT
In this account, the user is
allowed to gain access to
resources anywhere on the
network. The user provides his
or her username and password
during the logon process.
14. BUILT-IN USER ACCOUNT
There are two commonly used built-in accounts namely
the Administrator and Guest. The „Administrator‟
account is used if the user will manage the overall
computer and domain configuration for such tasks as
creating and modifying user accounts and groups,
managing security policies, creating printers and
assigning permissions and rights to user accounts to
gain access to resources. This account cannot be
deleted. The “Guest” account is used to provide
users who do not have an account in the domain with
the ability to log on and gain access to resources.
It does not require a password and is disabled by
default.
15. PASSWORD
GUIDELINES
PASSWORD GUIDELINES
Each user who has access to the
domain or computer should have a
strong password. A strong password
is used as an effective defense
against unauthorized access to a
computer resource. Passwords can be
up to 127 characters long. A
minimum length of seven characters
is recommended. A strong password
has the following characteristics
16. PASSWORD
GUIDELINES
PASSWORD GUIDELINES
• At least seven characters long. Does
not contain a user name, real name or
company name.
• Does not contain a complete dictionary
word.
• Is significantly different from
previous passwords.
• Passwords that increment are not
strong.
17. UPPERCAS
E
LETTERS
A, B, C
....
NUMERALS
0,1, 2,
3,4,5,6,7,
8, 9
LOWERCASE
LETTERS
a, b, c
...
SYMBOLS FOUND
ON KEYBOARD
ALL KEYBOARD
CHARACTERS
NOT DEFINED
AS LETTERS OR
NUMERALS)
` ~ ! @ # $ %
^ & * ( ) _ +
- = { } | [ ]
; “ ; „ < >
? , . /
CONTAINS CHARACTERS FROM EACH OF THE
FOLLOWING FOUR GROUPS SHOWN BELOW