SlideShare a Scribd company logo
Security Pack
Roger Cheng
3 Steps to Make Your Network Securer
 Connectivity allows one to more easily access the network to perform
data exchange based on software and hardware
 Connectivity also provides a means for hackers to intrude the network and
make threats aimed to compromise confidentiality, integrity and
availability
Why Network Security is Becoming More Important?
Data Software Hardware
Security Pack
Access Control List
How Do I Benefit From Network Security Of EKI?
IP Security
Login AuthenticationNetwork Access Control
 HTTPS, SSH
– A cryptographic network protocol makes data exchange
become unreadable
– It avoid the leakage of user account and configuration
Step 1 – Protect Your Switch
??
 IP Source Guard
– Legal host with known IP and MAC address is bundled on a
specific port to access the network
Step 2 – Prevent Unauthorized Network Access
MAC
IP
Correct IP/MAC
Incorrect IP/MAC
 IP Source Guard (cont.)
– IP-MAC-Port permit list (white list)
Step 2 – Prevent Unauthorized Network Access (cont.)
 DHCP Snooping
– Legal host obtains IP address successfully from DHCP server
and be added into IP-MAC-Port permit list automatically
Step 2 – Prevent Unauthorized Network Access (cont.)
Without DHCP Snooping With DHCP Snooping
DHCP Packet DHCP Packet
Illegal host with self-configured IP address Illegal host with self-configured IP address
 Access Control List
– Illegal frames with specific content are dropped
– Drop list (black list)
Step 3 – Protect Network Resource
Frames with
Legal content
Frames with
Illegal content
?
Not found
 DoS (Denial of Service) Attack Prevention
– A huge number of frames make malicious operation
continuously to paralysis the data server connected to the
network
– Identify and drop these frames
Step 3 – Protect Network Resource (cont.)
DoS Attack
DoS Attack
With DoS Attack Prevention
Without DoS Attack Prevention
Normal Operation
Abnormal Operation
Freeze!
Smooth
Thank
You
10%
29%
31%
30%
0
100
200
300
400
500
600
700
A B C D E F
Morbi fermen
tum justo.
TEXT 1 TEXT 2
Lorem ipsum
dolor sit.
Morbi fermen
tum justo.
Lorem ipsum
dolor sit.
TEXT 3 TEXT 4

More Related Content

What's hot

How to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber HackersHow to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber Hackers
techexpert2345
 
Wi fi
Wi fiWi fi
Wi fi
Rohit Shaw
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
Karwan Mustafa Kareem
 
Communications security for journalists
Communications security for journalistsCommunications security for journalists
Communications security for journalists
blogzilla
 
Computer Networks 4
Computer Networks 4Computer Networks 4
Computer Networks 4
Mr Smith
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Review unit 2 tecnology 2 eso
Review unit 2 tecnology 2 esoReview unit 2 tecnology 2 eso
Review unit 2 tecnology 2 eso
PILARSUREZMENESES
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
AfiqEfendy Zaen
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
JasminJaman1
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
Kanha Sahu
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
Gaurav Dalvi
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
Edgar Mwangangi
 
Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
 
Bao cao vpn
Bao cao vpnBao cao vpn
Bao cao vpn
tuaninfo88
 
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions
Forrester High School
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
Forrester High School
 
Internet terms
Internet termsInternet terms
Internet terms
theAidman
 
File Security System_2
File Security System_2File Security System_2
File Security System_2
Dheeraj Kumar Singh
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
Dushyant Singh
 

What's hot (20)

How to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber HackersHow to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber Hackers
 
Wi fi
Wi fiWi fi
Wi fi
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Communications security for journalists
Communications security for journalistsCommunications security for journalists
Communications security for journalists
 
Computer Networks 4
Computer Networks 4Computer Networks 4
Computer Networks 4
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Review unit 2 tecnology 2 eso
Review unit 2 tecnology 2 esoReview unit 2 tecnology 2 eso
Review unit 2 tecnology 2 eso
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
 
Spoofing
SpoofingSpoofing
Spoofing
 
Bao cao vpn
Bao cao vpnBao cao vpn
Bao cao vpn
 
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
 
Internet terms
Internet termsInternet terms
Internet terms
 
File Security System_2
File Security System_2File Security System_2
File Security System_2
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 

Similar to Advantech's steps to make your Network Securer

write a review about wired Network Security -Network vulnerabilities -.docx
write a review about wired Network Security -Network vulnerabilities -.docxwrite a review about wired Network Security -Network vulnerabilities -.docx
write a review about wired Network Security -Network vulnerabilities -.docx
noreendchesterton753
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
guestd05b31
 
Oss web application and network security
Oss   web application and network securityOss   web application and network security
Oss web application and network security
Rishabh Mehan
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
Miigaa Mine
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
drkelleher
 
IS Security Presentation
IS Security PresentationIS Security Presentation
IS Security Presentation
Renjith K P
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
Information Technology
 
Refer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docxRefer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docx
lorent8
 
Hack the hack
Hack the hackHack the hack
Hack the hack
Shakti Ranjan
 
network security / information security
network security / information securitynetwork security / information security
network security / information security
Rohan Choudhari
 
ip spoofing
ip spoofingip spoofing
ip spoofing
vipin soni
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Abdul Wahid
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
Sreerag Gopinath
 
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devices
phanleson
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
prachi67
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisited
inbroker
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
BachaSirata
 
Ericas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideEricas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-Guide
Erica StJohn
 
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security TestingEthical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
champubhaiya8
 

Similar to Advantech's steps to make your Network Securer (20)

write a review about wired Network Security -Network vulnerabilities -.docx
write a review about wired Network Security -Network vulnerabilities -.docxwrite a review about wired Network Security -Network vulnerabilities -.docx
write a review about wired Network Security -Network vulnerabilities -.docx
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Oss web application and network security
Oss   web application and network securityOss   web application and network security
Oss web application and network security
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 
IS Security Presentation
IS Security PresentationIS Security Presentation
IS Security Presentation
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Refer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docxRefer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docx
 
Hack the hack
Hack the hackHack the hack
Hack the hack
 
network security / information security
network security / information securitynetwork security / information security
network security / information security
 
ip spoofing
ip spoofingip spoofing
ip spoofing
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
 
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devices
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisited
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Ericas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-GuideEricas-Security-Plus-Study-Guide
Ericas-Security-Plus-Study-Guide
 
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security TestingEthical Hacking: Safeguarding Systems through Responsible Security Testing
Ethical Hacking: Safeguarding Systems through Responsible Security Testing
 

Recently uploaded

Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 

Recently uploaded (20)

Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 

Advantech's steps to make your Network Securer

  • 1. Security Pack Roger Cheng 3 Steps to Make Your Network Securer
  • 2.  Connectivity allows one to more easily access the network to perform data exchange based on software and hardware  Connectivity also provides a means for hackers to intrude the network and make threats aimed to compromise confidentiality, integrity and availability Why Network Security is Becoming More Important? Data Software Hardware
  • 3. Security Pack Access Control List How Do I Benefit From Network Security Of EKI? IP Security Login AuthenticationNetwork Access Control
  • 4.  HTTPS, SSH – A cryptographic network protocol makes data exchange become unreadable – It avoid the leakage of user account and configuration Step 1 – Protect Your Switch ??
  • 5.  IP Source Guard – Legal host with known IP and MAC address is bundled on a specific port to access the network Step 2 – Prevent Unauthorized Network Access MAC IP Correct IP/MAC Incorrect IP/MAC
  • 6.  IP Source Guard (cont.) – IP-MAC-Port permit list (white list) Step 2 – Prevent Unauthorized Network Access (cont.)
  • 7.  DHCP Snooping – Legal host obtains IP address successfully from DHCP server and be added into IP-MAC-Port permit list automatically Step 2 – Prevent Unauthorized Network Access (cont.) Without DHCP Snooping With DHCP Snooping DHCP Packet DHCP Packet Illegal host with self-configured IP address Illegal host with self-configured IP address
  • 8.  Access Control List – Illegal frames with specific content are dropped – Drop list (black list) Step 3 – Protect Network Resource Frames with Legal content Frames with Illegal content ? Not found
  • 9.  DoS (Denial of Service) Attack Prevention – A huge number of frames make malicious operation continuously to paralysis the data server connected to the network – Identify and drop these frames Step 3 – Protect Network Resource (cont.) DoS Attack DoS Attack With DoS Attack Prevention Without DoS Attack Prevention Normal Operation Abnormal Operation Freeze! Smooth
  • 10. Thank You 10% 29% 31% 30% 0 100 200 300 400 500 600 700 A B C D E F Morbi fermen tum justo. TEXT 1 TEXT 2 Lorem ipsum dolor sit. Morbi fermen tum justo. Lorem ipsum dolor sit. TEXT 3 TEXT 4