SlideShare a Scribd company logo
Module 3
Security Design
Considerations

© 2006 Extreme Networks, Inc. All rights reserved.
Description
This module provides an overview of the network
vulnerabilities and security threats companies face
today.
It reviews the factors that should be taken into
consideration when designing a security solution.
It describes basic Sentriant CE150 network design
configurations.
Finally, it lists the technical information needed
before you install the Sentriant CE150.

page 2

© 2006 Extreme Networks, Inc. All rights reserved.
Objectives
Upon completion of this module the successful
student will be able to:
• List the factors taken into consideration when designing a
network security solution.

• Understand the network vulnerabilities that are addressed
by the Sentriant CE150.

• Describe basic Sentriant CE150 network design
configurations.

• Identify the technical information required before you install
a Sentriant CE150 in a customer site.

page 3

© 2006 Extreme Networks, Inc. All rights reserved.
Traditional Defenses:
Firewalls and IDS

Firewall
• Enforce access control policies between networks
• Determine which inside services may be available from
outside and vice versa

• Provide a single “Choke point” where security audits may be
performed

• Provide information about who has been “sniffing” around

Intrusion Detection Systems (IDS)
• Excellent at detecting many types of network attacks

page 4

© 2006 Extreme Networks, Inc. All rights reserved.
Firewall and IDS Limitations
Cannot protect from attacks that bypass it
• Internal attacks or unrestricted dial-outs
Cannot protect data that is traversing the network
• Financial data, corporate secrets, etc.
Cannot protect against data being “changed” as it
moves across the network
Cannot stop any attacks that come from the inside

page 5

© 2006 Extreme Networks, Inc. All rights reserved.
Network Vulnerabilities
Unauthorized Access of Data in Motion
• Unauthorized monitoring – Network users believe the data they

send over networks will be viewed only by the intended receiver.

• Unauthorized modification – A simple route traced between any two
corporate networks may provide an opportunity for an intruder to
inconspicuously modify data.

Common Inside Attacks
• Insider breaches – Employees, contractors and others with

legitimate network access can easily bypass perimeter security to
access sensitive data on the network.

• Man-in-the-middle attacks (also known as TCP Hijacking) – An

attacker sniffs packets from the network, modifies them and inserts
them back into the network.

• Port mirroring – Port mirroring is a method of monitoring network
page 6

traffic that forwards a copy of each incoming and outgoing packet
from one port of a network switch to another port where the packet
can be studied.
© 2006 Extreme Networks, Inc. All rights reserved.
Mitigate Network Vulnerabilities:
Inside the Perimeter
It is important to secure your data as it travels within
your organization’s network.
• Insiders account for up to 50% of network security breaches.
A layered approach to network security provides the
best defense possible.
This means that in addition to perimeter security e.g.,
firewall perimeter security, data traversing the internal
network must also be secured.

page 7

The only way to protect data traversing internal networks is
to encrypt it. Sentriant CE150 provides the ideal solution for
encrypting and safeguarding data in motion.

© 2006 Extreme Networks, Inc. All rights reserved.
Elements of a Comprehensive
Security Solution
Physical protection
• Where are you?
User authentication
• Who are you?
Encryption
• Which information should be hidden?
Access control
• Which assets are you allowed to use?

page 8

Management
• What is going on within the network?
© 2006 Extreme Networks, Inc. All rights reserved.
Security Design Considerations
Performance
• Security solutions cannot become bottlenecks on the network.

Security appliances must provide low latency and high throughput.

User Transparency
• Security appliances should not require reconfiguration of routers,
gateways, or end-user devices

Centralize management and administration
• Security solutions should provide centralized management and
control, including: SNMP, MIB, audit and syslog

Regulatory compliance
• Security solutions must be able to support the every evolving
Federal and State government regulations, e.g., HIPAA

Resiliency
• Security solutions must be available 7/24 with the ability to update
page 9

security policies on the fly

© 2006 Extreme Networks, Inc. All rights reserved.
Review
3 Minutes

© 2006 Extreme Networks, Inc. All rights reserved.
Sentriant CE150
Non-Router Network - Outbound
Switch

Switch
Fiber backbone,
Pt-Pt Wireless
Switch network
Sentriant CE150

Sentriant CE150
Layer
2
Outbound Traffic

Non-Router Network Outbound traffic:

• This example explains the steps network equipment performs when
sending data from a company site out to an external entity in a nonrouter environment.
page 11

© 2006 Extreme Networks, Inc. All rights reserved.
Sentriant CE150
Non-Router Network - Inbound
Switch

Switch
Fiber backbone,
Pt-Pt Wireless
Switch network
Sentriant CE150

Sentriant CE150
Layer
2
Inbound Traffic

Non-Router Network Inbound traffic:
• This example explains the steps network equipment performs when
receiving data from an external entity into a company site in a nonrouter environment.

page 12

© 2006 Extreme Networks, Inc. All rights reserved.
Sentriant CE150
Router WANs - Outbound
Switch

Switch

Router

Router

Sentriant CE150

Sentriant CE150
Internet
Outbound Traffic

Router WAN/Backbone Outbound traffic:
• This example explains the steps network equipment performs when
sending data from a company site out to an external entity in a
router environment.

page 13

© 2006 Extreme Networks, Inc. All rights reserved.
Sentriant CE150
Router WANs - Inbound
Switch

Switch

Router

Router
Sentriant CE150

Sentriant CE150
Internet
Inbound Traffic

Router WAN/Backbone Inbound traffic:
• This example explains the steps network equipment performs when
receiving data from an external entity into a company site in a
router environment.

page 14

© 2006 Extreme Networks, Inc. All rights reserved.
Resiliency
Non-VRRP Example
Router 1

Router

A
Sentriant CE150

C

Router

Router 2

Sentriant CE150

Internet

Router

B

Router

D

Dual active-path redundancy

• This example has two Sentriant CE150 appliances at each end of
the connection creating two active paths between the locations.
page 15

© 2006 Extreme Networks, Inc. All rights reserved.
Resiliency
VRRP Example
Router 1

A

Router

Sentriant CE150

Router
Internet

C

B

Router 2

Sentriant CE150

D

Single active-path redundancy
• A pair of Sentriant CE150 appliances can be configured to form a virtual
security gateway (VSG).

• One appliance is active and the other waits in a backup state
Virtual Router Redundancy Protocol
• Allows two security gateways (Sentriant CE150) to share one IP address
page 16

© 2006 Extreme Networks, Inc. All rights reserved.
Review
3 Minutes

© 2006 Extreme Networks, Inc. All rights reserved.
Configuration Planning Worksheet
Interface Configuration

page 18

© 2006 Extreme Networks, Inc. All rights reserved.
Configuration Planning Worksheet
Management Access

page 19

© 2006 Extreme Networks, Inc. All rights reserved.
Configuration Planning Worksheet
FTP Client

page 20

© 2006 Extreme Networks, Inc. All rights reserved.
Configuration Planning Worksheet
Network Interoperability

page 21

© 2006 Extreme Networks, Inc. All rights reserved.
Configuration Planning Worksheet
Manual Key Policies

page 22

© 2006 Extreme Networks, Inc. All rights reserved.
Configuration Planning Worksheet
Negotiated IPSec

page 23

© 2006 Extreme Networks, Inc. All rights reserved.
Configuration Planning Worksheet
Negotiated IPSec (cont’d)

page 24

© 2006 Extreme Networks, Inc. All rights reserved.
Configuration Planning Worksheet
Discard and Clear Policy

page 25

© 2006 Extreme Networks, Inc. All rights reserved.
Summary
This module provided an overview of the network vulnerabilities
and security threats companies face today.
The module also reviewed the factors that should be taken into
consideration when designing a security solution.
It described basic Sentriant CE150 network design
configurations.
And finally, it provided the technical information worksheets
used to assist with the installation of the Sentriant CE150.

page 26

© 2006 Extreme Networks, Inc. All rights reserved.
Summary continued
You should now be able to:
• List the factors taken into consideration when designing a
network security solution.

• Understand the network vulnerabilities that are addressed
by the Sentriant CE150.

• It describe basic Sentriant CE150 network design
configurations.

• Identify the technical information required before you install
a Sentriant CE150 in a customer site.

page 27

© 2006 Extreme Networks, Inc. All rights reserved.
End of Module Review
5 Minutes

© 2006 Extreme Networks, Inc. All rights reserved.

More Related Content

What's hot

How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
Community Protection Forum
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
null The Open Security Community
 
Mapping document
Mapping documentMapping document
Mapping document
Suresh Kesavan
 
Waterfall Security Solutions Overview Q1 2012
Waterfall Security Solutions   Overview Q1 2012Waterfall Security Solutions   Overview Q1 2012
Waterfall Security Solutions Overview Q1 2012henkpieper
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
Westermo Network Technologies
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
ClubHack
 
Firewalls
FirewallsFirewalls
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Community Protection Forum
 
Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)
Priyanka Aash
 
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed FirewallsIRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET Journal
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A ReviewIRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET Journal
 
How I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart MeterHow I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart Meter
EnergySec
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review Checklist
Eberly Wilson
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centers
Narendran Vaideeswaran
 
Study Wireless Security Deployment - PKL
Study Wireless Security Deployment  - PKLStudy Wireless Security Deployment  - PKL
Study Wireless Security Deployment - PKLAaron ND Sawmadal
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2b
Sylvain Martinez
 
A Guide to 802.11 WiFi Security by US-CERT
A Guide to 802.11 WiFi Security by US-CERTA Guide to 802.11 WiFi Security by US-CERT
A Guide to 802.11 WiFi Security by US-CERT
David Sweigert
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
James Nesbitt
 
Lowering Industrial Network Total Cost of Ownership
Lowering Industrial Network Total Cost of OwnershipLowering Industrial Network Total Cost of Ownership
Lowering Industrial Network Total Cost of Ownership
Creekside Marketing Group, LLC
 

What's hot (20)

How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
 
Mapping document
Mapping documentMapping document
Mapping document
 
Waterfall Security Solutions Overview Q1 2012
Waterfall Security Solutions   Overview Q1 2012Waterfall Security Solutions   Overview Q1 2012
Waterfall Security Solutions Overview Q1 2012
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
 
Firewalls
FirewallsFirewalls
Firewalls
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)
 
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed FirewallsIRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A ReviewIRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
 
How I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart MeterHow I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart Meter
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review Checklist
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centers
 
Study Wireless Security Deployment - PKL
Study Wireless Security Deployment  - PKLStudy Wireless Security Deployment  - PKL
Study Wireless Security Deployment - PKL
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2b
 
A Guide to 802.11 WiFi Security by US-CERT
A Guide to 802.11 WiFi Security by US-CERTA Guide to 802.11 WiFi Security by US-CERT
A Guide to 802.11 WiFi Security by US-CERT
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
Lowering Industrial Network Total Cost of Ownership
Lowering Industrial Network Total Cost of OwnershipLowering Industrial Network Total Cost of Ownership
Lowering Industrial Network Total Cost of Ownership
 

Viewers also liked

WAN Services Planning Checklist
WAN Services Planning ChecklistWAN Services Planning Checklist
WAN Services Planning ChecklistXO Communications
 
UCB Corporate Compliance Training - Module 10 Security Awareness-Timothy Ledo...
UCB Corporate Compliance Training - Module 10 Security Awareness-Timothy Ledo...UCB Corporate Compliance Training - Module 10 Security Awareness-Timothy Ledo...
UCB Corporate Compliance Training - Module 10 Security Awareness-Timothy Ledo...Timothy Ledoux, MSCS, CISSO, CPTE
 
Security Awareness Training - Basic Module
Security Awareness Training - Basic ModuleSecurity Awareness Training - Basic Module
Security Awareness Training - Basic ModuleDario Ciro Vietri
 
East Sussex Hootsuite | Lesley Fairbairn
East Sussex Hootsuite | Lesley FairbairnEast Sussex Hootsuite | Lesley Fairbairn
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Bob Rhubart
 
Security guard training
Security guard trainingSecurity guard training
Security guard training
Robert Jack
 
How to prepare a basic training module
How to prepare a basic training moduleHow to prepare a basic training module
How to prepare a basic training moduleKALYANASUNDARAM Ar_Umu
 
Security training module
Security training moduleSecurity training module
Security training modulepagare_c
 
Visually impaired as a design challenge
Visually impaired as a design challenge Visually impaired as a design challenge
Visually impaired as a design challenge Husam AlMuzainy
 
Architecture for hot and humid climate
Architecture for hot and humid climateArchitecture for hot and humid climate
Architecture for hot and humid climate
Asmita Rawool
 
NoSQL Design Considerations and Lessons Learned
NoSQL Design Considerations and Lessons LearnedNoSQL Design Considerations and Lessons Learned
NoSQL Design Considerations and Lessons Learned
rivetlogic
 
payroll process
payroll processpayroll process
payroll processonearbaein
 
How To Prepare A Basic Training Module
How To Prepare A Basic Training ModuleHow To Prepare A Basic Training Module
How To Prepare A Basic Training Module
Bruhad Buch
 
Meet Henry
Meet HenryMeet Henry
Meet Henry
Ethos3
 
The hospitality industry – concepts, ideas and future
The hospitality industry – concepts, ideas and futureThe hospitality industry – concepts, ideas and future
The hospitality industry – concepts, ideas and futureklx1967
 
CUSTOMER SERVICE POWERPOINT
CUSTOMER SERVICE POWERPOINTCUSTOMER SERVICE POWERPOINT
CUSTOMER SERVICE POWERPOINT
Andrew Schwartz
 

Viewers also liked (16)

WAN Services Planning Checklist
WAN Services Planning ChecklistWAN Services Planning Checklist
WAN Services Planning Checklist
 
UCB Corporate Compliance Training - Module 10 Security Awareness-Timothy Ledo...
UCB Corporate Compliance Training - Module 10 Security Awareness-Timothy Ledo...UCB Corporate Compliance Training - Module 10 Security Awareness-Timothy Ledo...
UCB Corporate Compliance Training - Module 10 Security Awareness-Timothy Ledo...
 
Security Awareness Training - Basic Module
Security Awareness Training - Basic ModuleSecurity Awareness Training - Basic Module
Security Awareness Training - Basic Module
 
East Sussex Hootsuite | Lesley Fairbairn
East Sussex Hootsuite | Lesley FairbairnEast Sussex Hootsuite | Lesley Fairbairn
East Sussex Hootsuite | Lesley Fairbairn
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
 
Security guard training
Security guard trainingSecurity guard training
Security guard training
 
How to prepare a basic training module
How to prepare a basic training moduleHow to prepare a basic training module
How to prepare a basic training module
 
Security training module
Security training moduleSecurity training module
Security training module
 
Visually impaired as a design challenge
Visually impaired as a design challenge Visually impaired as a design challenge
Visually impaired as a design challenge
 
Architecture for hot and humid climate
Architecture for hot and humid climateArchitecture for hot and humid climate
Architecture for hot and humid climate
 
NoSQL Design Considerations and Lessons Learned
NoSQL Design Considerations and Lessons LearnedNoSQL Design Considerations and Lessons Learned
NoSQL Design Considerations and Lessons Learned
 
payroll process
payroll processpayroll process
payroll process
 
How To Prepare A Basic Training Module
How To Prepare A Basic Training ModuleHow To Prepare A Basic Training Module
How To Prepare A Basic Training Module
 
Meet Henry
Meet HenryMeet Henry
Meet Henry
 
The hospitality industry – concepts, ideas and future
The hospitality industry – concepts, ideas and futureThe hospitality industry – concepts, ideas and future
The hospitality industry – concepts, ideas and future
 
CUSTOMER SERVICE POWERPOINT
CUSTOMER SERVICE POWERPOINTCUSTOMER SERVICE POWERPOINT
CUSTOMER SERVICE POWERPOINT
 

Similar to Security Design Considerations Module 3 - Training Sample

Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
ikirkton
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
ericbrooks84875
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
Waqas Ahmed Nawaz
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
ThangDang53
 
It nv51 instructor_ppt_ch11
It nv51 instructor_ppt_ch11It nv51 instructor_ppt_ch11
It nv51 instructor_ppt_ch11
newbie2019
 
Introduction_to_Network_Security lecture
Introduction_to_Network_Security lectureIntroduction_to_Network_Security lecture
Introduction_to_Network_Security lecture
rosemaryjibril1
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
Kristen Wilson
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
rock73
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
Hamza Malik
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
Joseph Holbrook, Chief Learning Officer (CLO)
 
INT 1010 06-6.pdf
INT 1010 06-6.pdfINT 1010 06-6.pdf
INT 1010 06-6.pdf
Luis R Castellanos
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
Irsandi Hasan
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
Irsandi Hasan
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a Network
Yaser Rahmati
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
Vuz Dở Hơi
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a network
teknetir
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
Irsandi Hasan
 
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptxChapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptx
KennedyRodriguez10
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
Irsandi Hasan
 

Similar to Security Design Considerations Module 3 - Training Sample (20)

Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
It nv51 instructor_ppt_ch11
It nv51 instructor_ppt_ch11It nv51 instructor_ppt_ch11
It nv51 instructor_ppt_ch11
 
Introduction_to_Network_Security lecture
Introduction_to_Network_Security lectureIntroduction_to_Network_Security lecture
Introduction_to_Network_Security lecture
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
INT 1010 06-6.pdf
INT 1010 06-6.pdfINT 1010 06-6.pdf
INT 1010 06-6.pdf
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a Network
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a network
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptxChapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptx
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 

More from Content Rules, Inc.

Taxonomy and Terminology: The Crossroad of Controlled Vocabulary
Taxonomy and Terminology: The Crossroad of Controlled VocabularyTaxonomy and Terminology: The Crossroad of Controlled Vocabulary
Taxonomy and Terminology: The Crossroad of Controlled Vocabulary
Content Rules, Inc.
 
Taking Your Content to Global Proportinos - Global Website Best Practices
Taking Your Content to Global Proportinos - Global Website Best PracticesTaking Your Content to Global Proportinos - Global Website Best Practices
Taking Your Content to Global Proportinos - Global Website Best Practices
Content Rules, Inc.
 
Do Personas Work in a Global Marketplace?
Do Personas Work in a Global Marketplace?Do Personas Work in a Global Marketplace?
Do Personas Work in a Global Marketplace?
Content Rules, Inc.
 
Processing Source Terminology - Localization World 2014
Processing Source Terminology - Localization World 2014Processing Source Terminology - Localization World 2014
Processing Source Terminology - Localization World 2014
Content Rules, Inc.
 
Global content strategy meetup 10_16_14
Global content strategy meetup 10_16_14Global content strategy meetup 10_16_14
Global content strategy meetup 10_16_14
Content Rules, Inc.
 
Your Brain on XML: Structured Content and Operational Efficiency
Your Brain on XML: Structured Content and Operational EfficiencyYour Brain on XML: Structured Content and Operational Efficiency
Your Brain on XML: Structured Content and Operational Efficiency
Content Rules, Inc.
 
WikiProject Medicine: Breaking Down Barriers to Save Lives
WikiProject Medicine: Breaking Down Barriers to Save LivesWikiProject Medicine: Breaking Down Barriers to Save Lives
WikiProject Medicine: Breaking Down Barriers to Save Lives
Content Rules, Inc.
 
Content rules overview and global readiness
Content rules overview and global readinessContent rules overview and global readiness
Content rules overview and global readiness
Content Rules, Inc.
 
Preparing the Sentriant CE150 for Operation Module 7
 - - Training Sample
Preparing the Sentriant CE150 for Operation Module 7
 -  - Training SamplePreparing the Sentriant CE150 for Operation Module 7
 -  - Training Sample
Preparing the Sentriant CE150 for Operation Module 7
 - - Training Sample
Content Rules, Inc.
 
NetApp Word Cloud - Marketing Sample
NetApp Word Cloud - Marketing SampleNetApp Word Cloud - Marketing Sample
NetApp Word Cloud - Marketing Sample
Content Rules, Inc.
 
How to Write Using International English - Excerpt
How to Write Using International English - ExcerptHow to Write Using International English - Excerpt
How to Write Using International English - Excerpt
Content Rules, Inc.
 
P03 swisher val_developing a global content strategy_swisher
P03 swisher val_developing a global content strategy_swisherP03 swisher val_developing a global content strategy_swisher
P03 swisher val_developing a global content strategy_swisher
Content Rules, Inc.
 
Planning Your Global Content Strategy
Planning Your Global Content StrategyPlanning Your Global Content Strategy
Planning Your Global Content Strategy
Content Rules, Inc.
 
The Seven Components of a Global Content Strategy
The Seven Components of a Global Content StrategyThe Seven Components of a Global Content Strategy
The Seven Components of a Global Content Strategy
Content Rules, Inc.
 
Using Language to Change the World - Translators Without Borders
Using Language to Change the World - Translators Without BordersUsing Language to Change the World - Translators Without Borders
Using Language to Change the World - Translators Without Borders
Content Rules, Inc.
 
Google Course Lecture
Google Course LectureGoogle Course Lecture
Google Course Lecture
Content Rules, Inc.
 
Thinking Strategically About Content Destined for Machine Translation
Thinking Strategically About Content Destined for Machine TranslationThinking Strategically About Content Destined for Machine Translation
Thinking Strategically About Content Destined for Machine Translation
Content Rules, Inc.
 
Shepherding Your Content for Operational Efficiency
Shepherding Your Content for Operational EfficiencyShepherding Your Content for Operational Efficiency
Shepherding Your Content for Operational Efficiency
Content Rules, Inc.
 
It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...
It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...
It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...
Content Rules, Inc.
 

More from Content Rules, Inc. (20)

Taxonomy and Terminology: The Crossroad of Controlled Vocabulary
Taxonomy and Terminology: The Crossroad of Controlled VocabularyTaxonomy and Terminology: The Crossroad of Controlled Vocabulary
Taxonomy and Terminology: The Crossroad of Controlled Vocabulary
 
Taking Your Content to Global Proportinos - Global Website Best Practices
Taking Your Content to Global Proportinos - Global Website Best PracticesTaking Your Content to Global Proportinos - Global Website Best Practices
Taking Your Content to Global Proportinos - Global Website Best Practices
 
Do Personas Work in a Global Marketplace?
Do Personas Work in a Global Marketplace?Do Personas Work in a Global Marketplace?
Do Personas Work in a Global Marketplace?
 
Processing Source Terminology - Localization World 2014
Processing Source Terminology - Localization World 2014Processing Source Terminology - Localization World 2014
Processing Source Terminology - Localization World 2014
 
Global content strategy meetup 10_16_14
Global content strategy meetup 10_16_14Global content strategy meetup 10_16_14
Global content strategy meetup 10_16_14
 
Your Brain on XML: Structured Content and Operational Efficiency
Your Brain on XML: Structured Content and Operational EfficiencyYour Brain on XML: Structured Content and Operational Efficiency
Your Brain on XML: Structured Content and Operational Efficiency
 
WikiProject Medicine: Breaking Down Barriers to Save Lives
WikiProject Medicine: Breaking Down Barriers to Save LivesWikiProject Medicine: Breaking Down Barriers to Save Lives
WikiProject Medicine: Breaking Down Barriers to Save Lives
 
Content rules overview and global readiness
Content rules overview and global readinessContent rules overview and global readiness
Content rules overview and global readiness
 
Preparing the Sentriant CE150 for Operation Module 7
 - - Training Sample
Preparing the Sentriant CE150 for Operation Module 7
 -  - Training SamplePreparing the Sentriant CE150 for Operation Module 7
 -  - Training Sample
Preparing the Sentriant CE150 for Operation Module 7
 - - Training Sample
 
NetApp Word Cloud - Marketing Sample
NetApp Word Cloud - Marketing SampleNetApp Word Cloud - Marketing Sample
NetApp Word Cloud - Marketing Sample
 
How to Write Using International English - Excerpt
How to Write Using International English - ExcerptHow to Write Using International English - Excerpt
How to Write Using International English - Excerpt
 
P03 swisher val_developing a global content strategy_swisher
P03 swisher val_developing a global content strategy_swisherP03 swisher val_developing a global content strategy_swisher
P03 swisher val_developing a global content strategy_swisher
 
Planning Your Global Content Strategy
Planning Your Global Content StrategyPlanning Your Global Content Strategy
Planning Your Global Content Strategy
 
The Seven Components of a Global Content Strategy
The Seven Components of a Global Content StrategyThe Seven Components of a Global Content Strategy
The Seven Components of a Global Content Strategy
 
Using Language to Change the World - Translators Without Borders
Using Language to Change the World - Translators Without BordersUsing Language to Change the World - Translators Without Borders
Using Language to Change the World - Translators Without Borders
 
Google Course Lecture
Google Course LectureGoogle Course Lecture
Google Course Lecture
 
Thinking Strategically About Content Destined for Machine Translation
Thinking Strategically About Content Destined for Machine TranslationThinking Strategically About Content Destined for Machine Translation
Thinking Strategically About Content Destined for Machine Translation
 
Shepherding Your Content for Operational Efficiency
Shepherding Your Content for Operational EfficiencyShepherding Your Content for Operational Efficiency
Shepherding Your Content for Operational Efficiency
 
It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...
It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...
It Starts With The Source - Source English Terminology in a Multi-Channel, Gl...
 
Silver Peak Case Study
Silver Peak Case StudySilver Peak Case Study
Silver Peak Case Study
 

Recently uploaded

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 

Recently uploaded (20)

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 

Security Design Considerations Module 3 - Training Sample

  • 1. Module 3 Security Design Considerations © 2006 Extreme Networks, Inc. All rights reserved.
  • 2. Description This module provides an overview of the network vulnerabilities and security threats companies face today. It reviews the factors that should be taken into consideration when designing a security solution. It describes basic Sentriant CE150 network design configurations. Finally, it lists the technical information needed before you install the Sentriant CE150. page 2 © 2006 Extreme Networks, Inc. All rights reserved.
  • 3. Objectives Upon completion of this module the successful student will be able to: • List the factors taken into consideration when designing a network security solution. • Understand the network vulnerabilities that are addressed by the Sentriant CE150. • Describe basic Sentriant CE150 network design configurations. • Identify the technical information required before you install a Sentriant CE150 in a customer site. page 3 © 2006 Extreme Networks, Inc. All rights reserved.
  • 4. Traditional Defenses: Firewalls and IDS Firewall • Enforce access control policies between networks • Determine which inside services may be available from outside and vice versa • Provide a single “Choke point” where security audits may be performed • Provide information about who has been “sniffing” around Intrusion Detection Systems (IDS) • Excellent at detecting many types of network attacks page 4 © 2006 Extreme Networks, Inc. All rights reserved.
  • 5. Firewall and IDS Limitations Cannot protect from attacks that bypass it • Internal attacks or unrestricted dial-outs Cannot protect data that is traversing the network • Financial data, corporate secrets, etc. Cannot protect against data being “changed” as it moves across the network Cannot stop any attacks that come from the inside page 5 © 2006 Extreme Networks, Inc. All rights reserved.
  • 6. Network Vulnerabilities Unauthorized Access of Data in Motion • Unauthorized monitoring – Network users believe the data they send over networks will be viewed only by the intended receiver. • Unauthorized modification – A simple route traced between any two corporate networks may provide an opportunity for an intruder to inconspicuously modify data. Common Inside Attacks • Insider breaches – Employees, contractors and others with legitimate network access can easily bypass perimeter security to access sensitive data on the network. • Man-in-the-middle attacks (also known as TCP Hijacking) – An attacker sniffs packets from the network, modifies them and inserts them back into the network. • Port mirroring – Port mirroring is a method of monitoring network page 6 traffic that forwards a copy of each incoming and outgoing packet from one port of a network switch to another port where the packet can be studied. © 2006 Extreme Networks, Inc. All rights reserved.
  • 7. Mitigate Network Vulnerabilities: Inside the Perimeter It is important to secure your data as it travels within your organization’s network. • Insiders account for up to 50% of network security breaches. A layered approach to network security provides the best defense possible. This means that in addition to perimeter security e.g., firewall perimeter security, data traversing the internal network must also be secured. page 7 The only way to protect data traversing internal networks is to encrypt it. Sentriant CE150 provides the ideal solution for encrypting and safeguarding data in motion. © 2006 Extreme Networks, Inc. All rights reserved.
  • 8. Elements of a Comprehensive Security Solution Physical protection • Where are you? User authentication • Who are you? Encryption • Which information should be hidden? Access control • Which assets are you allowed to use? page 8 Management • What is going on within the network? © 2006 Extreme Networks, Inc. All rights reserved.
  • 9. Security Design Considerations Performance • Security solutions cannot become bottlenecks on the network. Security appliances must provide low latency and high throughput. User Transparency • Security appliances should not require reconfiguration of routers, gateways, or end-user devices Centralize management and administration • Security solutions should provide centralized management and control, including: SNMP, MIB, audit and syslog Regulatory compliance • Security solutions must be able to support the every evolving Federal and State government regulations, e.g., HIPAA Resiliency • Security solutions must be available 7/24 with the ability to update page 9 security policies on the fly © 2006 Extreme Networks, Inc. All rights reserved.
  • 10. Review 3 Minutes © 2006 Extreme Networks, Inc. All rights reserved.
  • 11. Sentriant CE150 Non-Router Network - Outbound Switch Switch Fiber backbone, Pt-Pt Wireless Switch network Sentriant CE150 Sentriant CE150 Layer 2 Outbound Traffic Non-Router Network Outbound traffic: • This example explains the steps network equipment performs when sending data from a company site out to an external entity in a nonrouter environment. page 11 © 2006 Extreme Networks, Inc. All rights reserved.
  • 12. Sentriant CE150 Non-Router Network - Inbound Switch Switch Fiber backbone, Pt-Pt Wireless Switch network Sentriant CE150 Sentriant CE150 Layer 2 Inbound Traffic Non-Router Network Inbound traffic: • This example explains the steps network equipment performs when receiving data from an external entity into a company site in a nonrouter environment. page 12 © 2006 Extreme Networks, Inc. All rights reserved.
  • 13. Sentriant CE150 Router WANs - Outbound Switch Switch Router Router Sentriant CE150 Sentriant CE150 Internet Outbound Traffic Router WAN/Backbone Outbound traffic: • This example explains the steps network equipment performs when sending data from a company site out to an external entity in a router environment. page 13 © 2006 Extreme Networks, Inc. All rights reserved.
  • 14. Sentriant CE150 Router WANs - Inbound Switch Switch Router Router Sentriant CE150 Sentriant CE150 Internet Inbound Traffic Router WAN/Backbone Inbound traffic: • This example explains the steps network equipment performs when receiving data from an external entity into a company site in a router environment. page 14 © 2006 Extreme Networks, Inc. All rights reserved.
  • 15. Resiliency Non-VRRP Example Router 1 Router A Sentriant CE150 C Router Router 2 Sentriant CE150 Internet Router B Router D Dual active-path redundancy • This example has two Sentriant CE150 appliances at each end of the connection creating two active paths between the locations. page 15 © 2006 Extreme Networks, Inc. All rights reserved.
  • 16. Resiliency VRRP Example Router 1 A Router Sentriant CE150 Router Internet C B Router 2 Sentriant CE150 D Single active-path redundancy • A pair of Sentriant CE150 appliances can be configured to form a virtual security gateway (VSG). • One appliance is active and the other waits in a backup state Virtual Router Redundancy Protocol • Allows two security gateways (Sentriant CE150) to share one IP address page 16 © 2006 Extreme Networks, Inc. All rights reserved.
  • 17. Review 3 Minutes © 2006 Extreme Networks, Inc. All rights reserved.
  • 18. Configuration Planning Worksheet Interface Configuration page 18 © 2006 Extreme Networks, Inc. All rights reserved.
  • 19. Configuration Planning Worksheet Management Access page 19 © 2006 Extreme Networks, Inc. All rights reserved.
  • 20. Configuration Planning Worksheet FTP Client page 20 © 2006 Extreme Networks, Inc. All rights reserved.
  • 21. Configuration Planning Worksheet Network Interoperability page 21 © 2006 Extreme Networks, Inc. All rights reserved.
  • 22. Configuration Planning Worksheet Manual Key Policies page 22 © 2006 Extreme Networks, Inc. All rights reserved.
  • 23. Configuration Planning Worksheet Negotiated IPSec page 23 © 2006 Extreme Networks, Inc. All rights reserved.
  • 24. Configuration Planning Worksheet Negotiated IPSec (cont’d) page 24 © 2006 Extreme Networks, Inc. All rights reserved.
  • 25. Configuration Planning Worksheet Discard and Clear Policy page 25 © 2006 Extreme Networks, Inc. All rights reserved.
  • 26. Summary This module provided an overview of the network vulnerabilities and security threats companies face today. The module also reviewed the factors that should be taken into consideration when designing a security solution. It described basic Sentriant CE150 network design configurations. And finally, it provided the technical information worksheets used to assist with the installation of the Sentriant CE150. page 26 © 2006 Extreme Networks, Inc. All rights reserved.
  • 27. Summary continued You should now be able to: • List the factors taken into consideration when designing a network security solution. • Understand the network vulnerabilities that are addressed by the Sentriant CE150. • It describe basic Sentriant CE150 network design configurations. • Identify the technical information required before you install a Sentriant CE150 in a customer site. page 27 © 2006 Extreme Networks, Inc. All rights reserved.
  • 28. End of Module Review 5 Minutes © 2006 Extreme Networks, Inc. All rights reserved.