Secure network
administration
concepts.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– Rule-based management.
– Additional secure network
administration concepts.
Page 4
Secure network administration concepts.
Page 5
Secure network administration concepts.
– Rule-based management defined.
» The implementation of rules at the technology level, used
to create a secure network environment. Rule-based
management should be designed and tested to ensure
that the rules function as expected.
– Firewall rules.
» The firewall rules should be configured in such a way that
only the required traffic is allowed to pass through.
• Whenever possible, the default rule should be to deny
traffic.
• Exceptions are then created to allow the required traffic.
» The last rule on any firewall should be an implicit deny
statement.
• Unless explicitly allowed, the traffic is denied entry into
the network.
Page 6
Secure network administration concepts.
– Access control list (ACL).
» Should be implemented wherever possible.
• Firewall rules are often called ACLs.
» Files and folders can have ACLs placed on them through
the use of permissions.
» Routers can have two ACLs per network interface.
• One ACL is on the inbound side of the interface.
• The other ACL is on the outbound side of the interface.
» All ACLs end with an implicit deny statement.
• If not explicitly allowed in the ACL, the traffic or request
is denied.
» Once created, the ACL should be tested for functionality.
• To ensure that required actions are allowed.
• To ensure that non-required actions are not allowed.
Page 7
Secure network administration concepts.
Page 8
Secure network administration concepts.
Secure router configuration.
Locking the front door
to the network.
Put active ACLs in place. Disable default
usernames and passwords. Require
passwords for all accessto the router.
Wheneverpossible, use only secure
protocols for access.
Port security.
Locking a back door to
the network.
Enable security on all switch ports.
This limits the ability of an attacker
to gain access through a switch.
MAC filtering is the security method
that is most commonly used.
Network separation.
Putting the eggs in more
than one basket.
Separate and group network
resources by function and security
needs. This can create more secure
areas within a network. Separation
can be achieved through VLAN
management.
Page 9
Secure network administration concepts.
VLAN management.
Keeping the fox out of
the hen house.
Change default managementVLANs.
Proper VLAN managementkeeps
network trafficwhere it belongs. To allow
inter-VLAN communication,the traffic
has to pass through a router.
Flood guards.
Blocking the most
common of attacks.
The most common network attack is
the denial of service (DoS) attack.
The attacker floods the network with
traffic to block legitimate traffic.
Flood guards can recognize the
pattern and halt the attack before the
damage is done.
Loop protection.
Preventing unnecessary
network traffic.
Redundant routes can create routing
loops. Routers use a time-to-live
(TTL) value and split horizon to
combat these. Redundant links on
switches can also create loops.
Spanning Tree Protocol (STP) will
negate the loops.
Page 10
Secure network administration concepts.
802.1x
Know exactly who has
access to resources.
802.1x is an authenticationprotocol used
on wired and wireless networks. It
requires users to authenticate(prove
who they are) against a central database
beforeaccess to the network is granted.
Unifiedthreatmanagement.
Multiple security
measures in one device.
Unified threat management (UTM) is
a possible all-in-one security
solution. UTM systems provide
multiple security functions (e.g.,
firewall and antivirus) in a single
network appliance.
Log analysis.
Know what is happening
all the time.
Security, system, and application
logs should be reviewed on a
regular basis. All too often they are
only reviewed after a problem has
occurred, when the signs were
present in the log files all along.
Page 11
Secure network administration concepts.
Rules-based management is the implementation of rules at the technology
level, to create a secure network environment. Rules should be
implemented at the firewall to limit traffic to just what is required. An ACL
should be used wherever possible to restrict access and actions to only
those that are absolutely required on the network.
Topic
Rule-based management.
Summary
Security needs to be considered from multiple aspects and angles in order
to ensure a secure network. Possible administrative strategies include
secure router configuration, port security, network separation, VLAN
management, flood guards, loop protection, 802.1x, UTM, and log analysis.
Additional secure network
administration concepts.
Page 12
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

PACE-IT, Security+1.2: Secure Network Administration Concepts

  • 1.
  • 2.
    Page 2 Instructor, PACE-ITProgram – Edmonds Community College Areas of expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3.
    Page 3 PACE-IT. – Rule-basedmanagement. – Additional secure network administration concepts.
  • 4.
    Page 4 Secure networkadministration concepts.
  • 5.
    Page 5 Secure networkadministration concepts. – Rule-based management defined. » The implementation of rules at the technology level, used to create a secure network environment. Rule-based management should be designed and tested to ensure that the rules function as expected. – Firewall rules. » The firewall rules should be configured in such a way that only the required traffic is allowed to pass through. • Whenever possible, the default rule should be to deny traffic. • Exceptions are then created to allow the required traffic. » The last rule on any firewall should be an implicit deny statement. • Unless explicitly allowed, the traffic is denied entry into the network.
  • 6.
    Page 6 Secure networkadministration concepts. – Access control list (ACL). » Should be implemented wherever possible. • Firewall rules are often called ACLs. » Files and folders can have ACLs placed on them through the use of permissions. » Routers can have two ACLs per network interface. • One ACL is on the inbound side of the interface. • The other ACL is on the outbound side of the interface. » All ACLs end with an implicit deny statement. • If not explicitly allowed in the ACL, the traffic or request is denied. » Once created, the ACL should be tested for functionality. • To ensure that required actions are allowed. • To ensure that non-required actions are not allowed.
  • 7.
    Page 7 Secure networkadministration concepts.
  • 8.
    Page 8 Secure networkadministration concepts. Secure router configuration. Locking the front door to the network. Put active ACLs in place. Disable default usernames and passwords. Require passwords for all accessto the router. Wheneverpossible, use only secure protocols for access. Port security. Locking a back door to the network. Enable security on all switch ports. This limits the ability of an attacker to gain access through a switch. MAC filtering is the security method that is most commonly used. Network separation. Putting the eggs in more than one basket. Separate and group network resources by function and security needs. This can create more secure areas within a network. Separation can be achieved through VLAN management.
  • 9.
    Page 9 Secure networkadministration concepts. VLAN management. Keeping the fox out of the hen house. Change default managementVLANs. Proper VLAN managementkeeps network trafficwhere it belongs. To allow inter-VLAN communication,the traffic has to pass through a router. Flood guards. Blocking the most common of attacks. The most common network attack is the denial of service (DoS) attack. The attacker floods the network with traffic to block legitimate traffic. Flood guards can recognize the pattern and halt the attack before the damage is done. Loop protection. Preventing unnecessary network traffic. Redundant routes can create routing loops. Routers use a time-to-live (TTL) value and split horizon to combat these. Redundant links on switches can also create loops. Spanning Tree Protocol (STP) will negate the loops.
  • 10.
    Page 10 Secure networkadministration concepts. 802.1x Know exactly who has access to resources. 802.1x is an authenticationprotocol used on wired and wireless networks. It requires users to authenticate(prove who they are) against a central database beforeaccess to the network is granted. Unifiedthreatmanagement. Multiple security measures in one device. Unified threat management (UTM) is a possible all-in-one security solution. UTM systems provide multiple security functions (e.g., firewall and antivirus) in a single network appliance. Log analysis. Know what is happening all the time. Security, system, and application logs should be reviewed on a regular basis. All too often they are only reviewed after a problem has occurred, when the signs were present in the log files all along.
  • 11.
    Page 11 Secure networkadministration concepts. Rules-based management is the implementation of rules at the technology level, to create a secure network environment. Rules should be implemented at the firewall to limit traffic to just what is required. An ACL should be used wherever possible to restrict access and actions to only those that are absolutely required on the network. Topic Rule-based management. Summary Security needs to be considered from multiple aspects and angles in order to ensure a secure network. Possible administrative strategies include secure router configuration, port security, network separation, VLAN management, flood guards, loop protection, 802.1x, UTM, and log analysis. Additional secure network administration concepts.
  • 12.
  • 13.
    This workforce solutionwas 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.