Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

When installing smoothwall, the green interface is commonly used to protect the iptables firewalls.

14/11/2020 Client: arwaabdullah Deadline: 12 Hours

Network Security, Firewalls,

and VPNs

Lesson 6

Firewall Implementation Options

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

1

Ethernet Color Standards

URL of above graphics: https://www.joncamfield.com/oss/schooltools/Reference/EthernetCabling.htm

T-568A Standard

T-568B Standard

Crossover Cable

Diagram of Wiring

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Network Topologies

Network topology: is the name given to the way in which the devices (called nodes) are physically connected in a network.

The network topology chosen typically dictates:

the type of cabling used in the network

The scalability of the network

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Bus Topology

Nodes are connected to a main (bus) cable. If data is being sent sent between nodes then other nodes cannot transmit. If too many nodes are connected then the transfer of data slows dramatically as the nodes have to wait longer for the bus to be clear.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Bus Topology (cont)

Advantages:

The simplest and cheapest to install and extend.

Well suited for temporary networks with not many nodes.

Very flexible as nodes can be attached or detached without disturbing the rest of the network.

Failure of one node does not affect the rest of the bus network.

Simpler than a ring topology to troubleshoot if there is a cable failure because sections can be isolated and tested independently.

Disadvantages:

If the bus cable fails then the whole network will fail.

Performance of the network slows down rapidly with more nodes or heavy network traffic.

The bus cable has a limited length and must be terminated properly at both ends to prevent reflected signals.

Slower than a ring network as data cannot be transmitted while the bus is in use by other nodes.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Ring Topology

In a ring topology, the nodes are connected in a ring and data travels in one direction using a control signal called a 'token'.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Ring Topology (cont)

Advantages:

Not greatly affected by adding further nodes or heavy network traffic as only the node with the 'token' can transmit data so there are no data collisions.

Relatively cheap to install and expand.

Disadvantages:

Slower than a star topology under normal load.

If the cable fails anywhere in the ring then the whole network will fail.

If any node fails then the token cannot be passed around the ring any longer so the whole network fails..

The hardest topology to troubleshoot because it can be hard to track down where in the ring the failure has occurred.

Harder to modify or expand because to add or remove a node you must shut down the network temporarily.

In order for the nodes to communicate with each other they must all be switched on.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Star Topology

In this type of network, a central computer (server) usually forms the main node and the subsidiary nodes are connected to it and to each other through a switch or hub.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Star Topology (cont)

Advantages:

The most reliable because the failure of a node or a node cable does not affect other nodes.

Simple to troubleshoot because only one node is affected by a cable break between the switch and the node.

Adding further nodes does not greatly affect performance because the data does not pass through unnecessary nodes.

Easily upgraded from a hub to a switch for higher performance. Easy to install and to expand with extra nodes.

Disadvantages:

Uses the most cable which makes it more expensive to install than the other two topologies.

The extra hardware required such as hubs or switches further increases the cost.

As the central computer controls the whole system, the whole system will be affected if it breaks down or if the cable link between it and the switch fails.

If the switch, the link to the server or the server itself fails then the whole network fails.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Network Topologies Summary

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

IEEE

IEEE stands for the "Institute of Electrical and Electronics Engineers".

composed of computer scientists, software developers, information technology professionals, physicists, and medical doctors, in addition to IEEE's electrical and electronics engineering core.

For this reason the organization no longer goes by the full name, except on legal business documents, and is referred to simply as IEEE.

The IEEE is dedicated to advancing technological innovation and excellence. It has about 425,000 members in about 160 countries.

The IEEE is one of the leading bodies to produce standards relating to networking.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

IEEE 802 Standards

IEEE 802 refers to a family of standards dealing with local area networks (LAN), wide-area networks (WAN) and metropolitan area networks (MAN).

The 802 number is the name of the IEEE committee that deals with networking standards

Various subcommittees have been created to deal with specific standards. They are denoted by 802.x where x is the number of the subcommittee.

For instance, 802.11 deals with WiFi.

802 typically deals with OSI layers 2 and 1.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.1

802.1 Bridging and Network Management

802.1q Virtual Local Area Networks (VLAN)

In computer networking, a single layer-2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them via one or more routers.

Traffic is marked (or tagged) to be a part of a specific VLAN

Traffic stays within its own VLAN and must be routed to other VLANs.

In computer networking, a single layer-2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them via one or more routers

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.1x

802.1x Port Based Security

It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.

defines the encapsulation of the Extensible Authentication Protocol (EAP) over IEEE 802

802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server.

The supplicant is a client device (such as a laptop) that wishes to attach to the LAN

The authenticator acts like a security guard to a protected network. The supplicant (i.e., client device) is not allowed access through the authenticator to the protected side of the network until the supplicant’s identity has been validated and authorized.

The authentication server determines if the supplicants credentials provided to the authenticator are valid. If they are valid, the supplicant (client device) is allowed to access resources located on the protected side of the network.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.1x (cont)

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.1x Process

On detection of a new supplicant, the port on the switch (authenticator) is enabled and set to the "unauthorized" state. In this state, only 802.1X traffic is allowed; other traffic, such as the Internet Protocol (and with that TCP and UDP), is dropped.

To initiate authentication the authenticator will periodically transmit EAP-Request Identity frames to a special Layer 2 address on the local network segment. The supplicant listens on this address, and on receipt of the EAP-Request Identity frame it responds with an EAP-Response Identity frame containing an identifier for the supplicant such as a User ID. The authenticator then encapsulates this Identity response in a RADIUS Access-Request packet and forwards it on to the authentication server. The supplicant may also initiate or restart authentication by sending an EAPOL-Start frame to the authenticator, which will then reply with an EAP-Request Identity frame.

The authentication server sends a reply (encapsulated in a RADIUS Access-Challenge packet) to the authenticator, containing an EAP Request specifying the EAP Method (The type of EAP based authentication it wishes the supplicant to perform). The authenticator encapsulates the EAP Request in an EAPOL frame and transmits it to the supplicant. At this point the supplicant can start using the requested EAP Method, or do an NAK ("Negative Acknowledgement") and respond with the EAP Methods it is willing to perform.

If the authentication server and supplicant agree on an EAP Method, EAP Requests and Responses are sent between the supplicant and the authentication server (translated by the authenticator) until the authentication server responds with either an EAP-Success message (encapsulated in a RADIUS Access-Accept packet), or an EAP-Failure message (encapsulated in a RADIUS Access-Reject packet). If authentication is successful, the authenticator sets the port to the "authorized" state and normal traffic is allowed, if it is unsuccessful the port remains in the "unauthorized" state. When the supplicant logs off, it sends an EAPOL-logoff message to the authenticator, the authenticator then sets the port to the "unauthorized" state, once again blocking all non-EAP traffic.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.2 Logical Link Control

Defines Logical Link Control (LLC), which is the upper portion of the data link layer of the OSI Model.

The LLC sublayer presents a uniform interface to the user of the data link service, usually the network layer.

Beneath the LLC sublayer is the Media Access Control (MAC) sublayer, which is dependent on the particular medium being used (Ethernet, token ring, FDDI, 802.11, etc.).

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.3 Ethernet

A group of standards that define the physical network media and bandwidth of the network.

Bandwidth: The amount of data that can be transmitted over a given period of time. Examples: 100Mbps or 1Gbps

Type of cable supported: Twisted Pair Cabling (Cat5,6), Fiber optic cable (multimode and single mode) and coax.

Cat 6:1Gbps at 100M, 10Gbps at 33M

Implements Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.4 Token Bus

Network implementing the token ring protocol over a "virtual ring" on a coaxial cable.

Disbanded and standard withdrawn

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.5 Token Ring

Defines the MAC layer for token ring networks.

Initially token ring was a proprietary technology of IBM

Maximum bandwidth 15Mbps.

No current research being conducted.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.6 MAN

A Metropolitan Area Network (MAN) is computer network larger than a local area network, covering an area of a few city blocks to the area of an entire city.

MAN links between local area networks have been built with wireless links using either microwave, radio, or infra-red laser transmission.

Most companies rent or lease circuits from common carriers because laying long stretches of cable is expensive.

Some wired technologies used in MANs include

Fiber Distributed (FDDI): provides a 100 Mbit/s optical standard for data transmission in local area network that can extend in range up to 200 kilometers (120 mi). Although FDDI logical topology is a ring-based token network, it did not use the IEEE 802.5 token ring protocol as its basis; instead, its protocol was derived from the IEEE 802.4 token bus timed token protocol.

Asynchronous Transfer Mode (ATM):developed to meet the needs of the Broadband Integrated Services Digital Network, as defined in the late 1980s, and designed to unify telecommunication and computer networks.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.11 WiFi

Standards relating to communication via radio frequency.

Standard Bandwidth Frequency Distance

802.11a 54Mbps 5Ghz 30M

802.11b 10Mbps 2.4Ghz 100M

802.11g 54Mbps 2.4Ghz 100M

802.11n 600Mbps 2.4/5Ghz 250M

802.11ac 6.77Gbps 2.4/5Ghz 250M

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.11 Privacy

Wired Equivalent Privacy (WEP)

Designed to approximate wired hub-based Ethernet environment.

Key entered into both the access point and the clients.

All participants in the WiFi LAN.

Uses a stream cipher to protect data

Key length is the initialization vector (IV) plus the WEP key

128 bit WEP = 104b key + 24 bit IV

64 bit WEP = 40b key + 24b IV

Because RC4 is a stream cipher, the same traffic key must never be used twice. The purpose of an IV, which is transmitted as plain text, is to prevent any repetition, but a 24-bit IV is not long enough to ensure this on a busy network. The way the IV was used also opened WEP to a related key attack. For a 24-bit IV, there is a 50% probability the same IV will repeat after 5000 packets.

Depending on the amount of network traffic, and thus the number of packets available for inspection, a successful key recovery could take as little as one minute.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.11 Privacy (Cont)

WiFi Protected Access (WPA) replaced WEP.

Firmware upgrade

Improved implementation of RC4

Improved implementation of Ivs. (TKIP)

TKIP employs a per-packet key, meaning that it dynamically generates a new 128-bit key for each packet and thus prevents the types of attacks that compromised WEP.

WPA2 replaced WPA

Uses AES encryption instead of RC4

WPA2 is mandatory for a device to bear the WiFi trademark.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.15 Bluetooth

Bluetooth

Low power, short distances

Operates at the ISM (Industry, Scientific, Medical) band at 2.45Ghz

10Meter range

721Kbps bandwidth

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Wireless Radio Technologies

Direct Sequence Spread Spectrum (DSSS): Spreads transmissions over a larger frequency band.

The signal is less susceptible to interference at any specific frequency

A pseudo-random noise code is modulated with the signal during transmission.

The resulting signal resembles white noise.

The receiver filters out the noise.

Uses

802.11b

US GPS

Bluetooth

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Wireless Radio Technologies

Frequency Hopping Spread Spectrum (FHSS): a method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver.

Uses

Military communication

Federal Aviation Administration (FAA)

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Wireless Radio Technologies

Orthogonal Frequency Division Multiplexing (OFDM): a signal that is subdivided into frequency sub bands.

Each of these sub bands can be broadcast together without interference.

The basic idea of OFDM is to split a high bandwidth transmission into several lower bandwidth transmissions.

Uses

Digital TV broadcasts

802.11a, 802.11g, 802.11n, 802.11ac

ADSL

LTE, LTE Advanced

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Wireless Radio Technologies

Frequency Division Multiple Access: Subdivides a frequency band and assigns an analog conversation to each sub-band.

Only used in analog cellular

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Wireless Radio Technologies

Code Division Multiple Access (CDMA)

Similar to DSSS

It spreads each call over a wide spectrum and and is tagged with pseudo-random noise code to differentiate the calls

CDMA2000 Is a family of 3G access that uses CDMA channel access (typically, far east)

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Wireless Radio Technologies

Universal Mobile Telecommunications System Time0Dvision Duplexing (UMTS TDD): a third generation mobile cellular system

data transfer rates of 2 Mbps at 5Mhz

data transfer rates of 42 Mbps for HSPA+

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Data Center

Data center is a facility used to house computer systems and associated components, such as telecommunications and storage systems.

Hot Sites: “proactive” hot site allows you to keep servers and a live backup site up and running in the event of a disaster

Warm Sites: A “preventative” warm site allows you to pre-install your hardware and pre-configure your bandwidth needs. Then, if disaster strikes, all you have to do is load your software and data to restore your business systems.

Cold Sites: A “recovery” cold site is essentially just data center space, power, and network connectivity that’s ready and waiting for whenever you might need it.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Different Types of Networks

Local Area Networks (LAN) = room/building

Campus Area Network (CAN) = a complex of adjacent buildings

Metropolitan Area Networks (MAN) = a city

Wide Area Networks (WAN) = a large geographic area (across metropolitan, regional, national or international boundaries)

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Buy Coursework Help
Quality Homework Helper
Writer Writer Name Offer Chat
Buy Coursework Help

ONLINE

Buy Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$62 Chat With Writer
Quality Homework Helper

ONLINE

Quality Homework Helper

Hi dear, I am ready to do your homework in a reasonable price.

$62 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Advanced Cyber security - Japanese snowbell fall color - Click and learn virus explorer answers - Determine the required value of the missing probability - Http exploration marinersmuseum org subject vasco de balboa - Nurs 6512 head to toe assessment - Foundation In Special Education - Advwin trading pty ltd - Developing person through the life span 10th edition pdf free - 3.2 possessive adjectives worksheet answers - Ice melting in water final temperature - MILITARY DIME PROCESS - Desert song piano chords - Hard rock human resource strategy - Unisa late submission of assignments - Stephenson's model of reflection - Can aboriginals say nigga - Further maths formula booklet - Discussion - Penjodoh bilangan jam tangan - Strategic management multiple choice questions and answers - Fired over facebook case study - Mohs hardness scale worksheet - Question & Answer - Introduction to health care agencies answer key - Exploring connections learning in the 21st century - Evaluate Employment Law - Macbeth and a simple plan - Nuffield dyspraxia programme manual - Negligent hiring - 632lastd1 - Workplace safety plan worksheet hrm 420 - Sherman alexie dear john wayne - West lothian council my toolkit - Uber analysis pdf - Zigby manufacturing production budget - How does gymnema tea change taste - Aristotle nicomachean ethics book ii - Different types of sensors used in robots ppt - Young Nyana - Atavist business model - The alchemist questions and answers - European patent office jobs - HIMA350 Week 2 Assignment - English is a crazy language article - Arc welding basics ppt - The mismeasure of man sparknotes - Romeo and juliet vocabulary definitions - Kent uni print credits - A total asset turnover ratio of 2.8 indicates that - 58 oswald street invermay - The context of business understanding the canadian business environment pdf - Microflix activity immunology infection and initial response - Ccna 4 exam 6 - FIN534 Week7 Assignment Part 1 (2 pages) - Http evolve elsevier com mccance - University of melbourne late submission penalty - Insulin onset peak duration table - Distribution channel adopted by avon - How to calculate quota rent - Data mashups and gis are data integration technologies. - Essay - Examples of soap notes for chronic problems - A wagner matinee symbols - Theodore roosevelt hyphenated american speech - Hi macs color chart - Conclusion of a final paper 2 pages. - Love suicides at amijima pdf - Writing the complete equation homework answers - 55mm ring size australia - Peugeot 308 sw boot dimensions - 1800 mm to cm - Homework - 7.2 3.7 lab troubleshooting advanced eigrp - Error no text of specified style in document - Dorothea orem self care deficit theory powerpoint - 2/3 journal - Wgu c170 donut shop - Ace star model of knowledge transformation - Persuasive writing holiday destination - According to philosopher john locke, which of the following statements about human rights is true? - Marketplace simulation login - What is a change agent in nursing - The first accented beat of a measure is called a - Broadcast tools wvrc 8 - Psychometric success abstract reasoning - Career planning case study with solution - Body of knowledge ohs - Healthcare Environment - Thermann 25l hot water unit - Swot analysis panera - The boyfriend's death urban legend - Marcel supervises a group of paralegals serving the firm's lawyers - How many significant figures in 10.00 - How to find avc average variable cost - Food storage in plants biology - Evolution of circulatory system in animals - Susan nichter paintings never been seen - Sandstone creek club timeshare for sale - Human resource management an experiential approach 6th edition pdf free