Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

When installing smoothwall, the green interface is commonly used to protect the iptables firewalls.

14/11/2020 Client: arwaabdullah Deadline: 12 Hours

Network Security, Firewalls,

and VPNs

Lesson 6

Firewall Implementation Options

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

1

Ethernet Color Standards

URL of above graphics: https://www.joncamfield.com/oss/schooltools/Reference/EthernetCabling.htm

T-568A Standard

T-568B Standard

Crossover Cable

Diagram of Wiring

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Network Topologies

Network topology: is the name given to the way in which the devices (called nodes) are physically connected in a network.

The network topology chosen typically dictates:

the type of cabling used in the network

The scalability of the network

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Bus Topology

Nodes are connected to a main (bus) cable. If data is being sent sent between nodes then other nodes cannot transmit. If too many nodes are connected then the transfer of data slows dramatically as the nodes have to wait longer for the bus to be clear.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Bus Topology (cont)

Advantages:

The simplest and cheapest to install and extend.

Well suited for temporary networks with not many nodes.

Very flexible as nodes can be attached or detached without disturbing the rest of the network.

Failure of one node does not affect the rest of the bus network.

Simpler than a ring topology to troubleshoot if there is a cable failure because sections can be isolated and tested independently.

Disadvantages:

If the bus cable fails then the whole network will fail.

Performance of the network slows down rapidly with more nodes or heavy network traffic.

The bus cable has a limited length and must be terminated properly at both ends to prevent reflected signals.

Slower than a ring network as data cannot be transmitted while the bus is in use by other nodes.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Ring Topology

In a ring topology, the nodes are connected in a ring and data travels in one direction using a control signal called a 'token'.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Ring Topology (cont)

Advantages:

Not greatly affected by adding further nodes or heavy network traffic as only the node with the 'token' can transmit data so there are no data collisions.

Relatively cheap to install and expand.

Disadvantages:

Slower than a star topology under normal load.

If the cable fails anywhere in the ring then the whole network will fail.

If any node fails then the token cannot be passed around the ring any longer so the whole network fails..

The hardest topology to troubleshoot because it can be hard to track down where in the ring the failure has occurred.

Harder to modify or expand because to add or remove a node you must shut down the network temporarily.

In order for the nodes to communicate with each other they must all be switched on.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Star Topology

In this type of network, a central computer (server) usually forms the main node and the subsidiary nodes are connected to it and to each other through a switch or hub.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Star Topology (cont)

Advantages:

The most reliable because the failure of a node or a node cable does not affect other nodes.

Simple to troubleshoot because only one node is affected by a cable break between the switch and the node.

Adding further nodes does not greatly affect performance because the data does not pass through unnecessary nodes.

Easily upgraded from a hub to a switch for higher performance. Easy to install and to expand with extra nodes.

Disadvantages:

Uses the most cable which makes it more expensive to install than the other two topologies.

The extra hardware required such as hubs or switches further increases the cost.

As the central computer controls the whole system, the whole system will be affected if it breaks down or if the cable link between it and the switch fails.

If the switch, the link to the server or the server itself fails then the whole network fails.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Network Topologies Summary

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

IEEE

IEEE stands for the "Institute of Electrical and Electronics Engineers".

composed of computer scientists, software developers, information technology professionals, physicists, and medical doctors, in addition to IEEE's electrical and electronics engineering core.

For this reason the organization no longer goes by the full name, except on legal business documents, and is referred to simply as IEEE.

The IEEE is dedicated to advancing technological innovation and excellence. It has about 425,000 members in about 160 countries.

The IEEE is one of the leading bodies to produce standards relating to networking.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

IEEE 802 Standards

IEEE 802 refers to a family of standards dealing with local area networks (LAN), wide-area networks (WAN) and metropolitan area networks (MAN).

The 802 number is the name of the IEEE committee that deals with networking standards

Various subcommittees have been created to deal with specific standards. They are denoted by 802.x where x is the number of the subcommittee.

For instance, 802.11 deals with WiFi.

802 typically deals with OSI layers 2 and 1.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.1

802.1 Bridging and Network Management

802.1q Virtual Local Area Networks (VLAN)

In computer networking, a single layer-2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them via one or more routers.

Traffic is marked (or tagged) to be a part of a specific VLAN

Traffic stays within its own VLAN and must be routed to other VLANs.

In computer networking, a single layer-2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them via one or more routers

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.1x

802.1x Port Based Security

It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.

defines the encapsulation of the Extensible Authentication Protocol (EAP) over IEEE 802

802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server.

The supplicant is a client device (such as a laptop) that wishes to attach to the LAN

The authenticator acts like a security guard to a protected network. The supplicant (i.e., client device) is not allowed access through the authenticator to the protected side of the network until the supplicant’s identity has been validated and authorized.

The authentication server determines if the supplicants credentials provided to the authenticator are valid. If they are valid, the supplicant (client device) is allowed to access resources located on the protected side of the network.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.1x (cont)

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.1x Process

On detection of a new supplicant, the port on the switch (authenticator) is enabled and set to the "unauthorized" state. In this state, only 802.1X traffic is allowed; other traffic, such as the Internet Protocol (and with that TCP and UDP), is dropped.

To initiate authentication the authenticator will periodically transmit EAP-Request Identity frames to a special Layer 2 address on the local network segment. The supplicant listens on this address, and on receipt of the EAP-Request Identity frame it responds with an EAP-Response Identity frame containing an identifier for the supplicant such as a User ID. The authenticator then encapsulates this Identity response in a RADIUS Access-Request packet and forwards it on to the authentication server. The supplicant may also initiate or restart authentication by sending an EAPOL-Start frame to the authenticator, which will then reply with an EAP-Request Identity frame.

The authentication server sends a reply (encapsulated in a RADIUS Access-Challenge packet) to the authenticator, containing an EAP Request specifying the EAP Method (The type of EAP based authentication it wishes the supplicant to perform). The authenticator encapsulates the EAP Request in an EAPOL frame and transmits it to the supplicant. At this point the supplicant can start using the requested EAP Method, or do an NAK ("Negative Acknowledgement") and respond with the EAP Methods it is willing to perform.

If the authentication server and supplicant agree on an EAP Method, EAP Requests and Responses are sent between the supplicant and the authentication server (translated by the authenticator) until the authentication server responds with either an EAP-Success message (encapsulated in a RADIUS Access-Accept packet), or an EAP-Failure message (encapsulated in a RADIUS Access-Reject packet). If authentication is successful, the authenticator sets the port to the "authorized" state and normal traffic is allowed, if it is unsuccessful the port remains in the "unauthorized" state. When the supplicant logs off, it sends an EAPOL-logoff message to the authenticator, the authenticator then sets the port to the "unauthorized" state, once again blocking all non-EAP traffic.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.2 Logical Link Control

Defines Logical Link Control (LLC), which is the upper portion of the data link layer of the OSI Model.

The LLC sublayer presents a uniform interface to the user of the data link service, usually the network layer.

Beneath the LLC sublayer is the Media Access Control (MAC) sublayer, which is dependent on the particular medium being used (Ethernet, token ring, FDDI, 802.11, etc.).

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.3 Ethernet

A group of standards that define the physical network media and bandwidth of the network.

Bandwidth: The amount of data that can be transmitted over a given period of time. Examples: 100Mbps or 1Gbps

Type of cable supported: Twisted Pair Cabling (Cat5,6), Fiber optic cable (multimode and single mode) and coax.

Cat 6:1Gbps at 100M, 10Gbps at 33M

Implements Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.4 Token Bus

Network implementing the token ring protocol over a "virtual ring" on a coaxial cable.

Disbanded and standard withdrawn

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.5 Token Ring

Defines the MAC layer for token ring networks.

Initially token ring was a proprietary technology of IBM

Maximum bandwidth 15Mbps.

No current research being conducted.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.6 MAN

A Metropolitan Area Network (MAN) is computer network larger than a local area network, covering an area of a few city blocks to the area of an entire city.

MAN links between local area networks have been built with wireless links using either microwave, radio, or infra-red laser transmission.

Most companies rent or lease circuits from common carriers because laying long stretches of cable is expensive.

Some wired technologies used in MANs include

Fiber Distributed (FDDI): provides a 100 Mbit/s optical standard for data transmission in local area network that can extend in range up to 200 kilometers (120 mi). Although FDDI logical topology is a ring-based token network, it did not use the IEEE 802.5 token ring protocol as its basis; instead, its protocol was derived from the IEEE 802.4 token bus timed token protocol.

Asynchronous Transfer Mode (ATM):developed to meet the needs of the Broadband Integrated Services Digital Network, as defined in the late 1980s, and designed to unify telecommunication and computer networks.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.11 WiFi

Standards relating to communication via radio frequency.

Standard Bandwidth Frequency Distance

802.11a 54Mbps 5Ghz 30M

802.11b 10Mbps 2.4Ghz 100M

802.11g 54Mbps 2.4Ghz 100M

802.11n 600Mbps 2.4/5Ghz 250M

802.11ac 6.77Gbps 2.4/5Ghz 250M

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.11 Privacy

Wired Equivalent Privacy (WEP)

Designed to approximate wired hub-based Ethernet environment.

Key entered into both the access point and the clients.

All participants in the WiFi LAN.

Uses a stream cipher to protect data

Key length is the initialization vector (IV) plus the WEP key

128 bit WEP = 104b key + 24 bit IV

64 bit WEP = 40b key + 24b IV

Because RC4 is a stream cipher, the same traffic key must never be used twice. The purpose of an IV, which is transmitted as plain text, is to prevent any repetition, but a 24-bit IV is not long enough to ensure this on a busy network. The way the IV was used also opened WEP to a related key attack. For a 24-bit IV, there is a 50% probability the same IV will repeat after 5000 packets.

Depending on the amount of network traffic, and thus the number of packets available for inspection, a successful key recovery could take as little as one minute.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.11 Privacy (Cont)

WiFi Protected Access (WPA) replaced WEP.

Firmware upgrade

Improved implementation of RC4

Improved implementation of Ivs. (TKIP)

TKIP employs a per-packet key, meaning that it dynamically generates a new 128-bit key for each packet and thus prevents the types of attacks that compromised WEP.

WPA2 replaced WPA

Uses AES encryption instead of RC4

WPA2 is mandatory for a device to bear the WiFi trademark.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

802.15 Bluetooth

Bluetooth

Low power, short distances

Operates at the ISM (Industry, Scientific, Medical) band at 2.45Ghz

10Meter range

721Kbps bandwidth

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Wireless Radio Technologies

Direct Sequence Spread Spectrum (DSSS): Spreads transmissions over a larger frequency band.

The signal is less susceptible to interference at any specific frequency

A pseudo-random noise code is modulated with the signal during transmission.

The resulting signal resembles white noise.

The receiver filters out the noise.

Uses

802.11b

US GPS

Bluetooth

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Wireless Radio Technologies

Frequency Hopping Spread Spectrum (FHSS): a method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver.

Uses

Military communication

Federal Aviation Administration (FAA)

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Wireless Radio Technologies

Orthogonal Frequency Division Multiplexing (OFDM): a signal that is subdivided into frequency sub bands.

Each of these sub bands can be broadcast together without interference.

The basic idea of OFDM is to split a high bandwidth transmission into several lower bandwidth transmissions.

Uses

Digital TV broadcasts

802.11a, 802.11g, 802.11n, 802.11ac

ADSL

LTE, LTE Advanced

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Wireless Radio Technologies

Frequency Division Multiple Access: Subdivides a frequency band and assigns an analog conversation to each sub-band.

Only used in analog cellular

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Wireless Radio Technologies

Code Division Multiple Access (CDMA)

Similar to DSSS

It spreads each call over a wide spectrum and and is tagged with pseudo-random noise code to differentiate the calls

CDMA2000 Is a family of 3G access that uses CDMA channel access (typically, far east)

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Wireless Radio Technologies

Universal Mobile Telecommunications System Time0Dvision Duplexing (UMTS TDD): a third generation mobile cellular system

data transfer rates of 2 Mbps at 5Mhz

data transfer rates of 42 Mbps for HSPA+

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Data Center

Data center is a facility used to house computer systems and associated components, such as telecommunications and storage systems.

Hot Sites: “proactive” hot site allows you to keep servers and a live backup site up and running in the event of a disaster

Warm Sites: A “preventative” warm site allows you to pre-install your hardware and pre-configure your bandwidth needs. Then, if disaster strikes, all you have to do is load your software and data to restore your business systems.

Cold Sites: A “recovery” cold site is essentially just data center space, power, and network connectivity that’s ready and waiting for whenever you might need it.

Page ‹#›

Network Security, Firewalls, and VPNs

© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company

www.jblearning.com

All rights reserved.

Different Types of Networks

Local Area Networks (LAN) = room/building

Campus Area Network (CAN) = a complex of adjacent buildings

Metropolitan Area Networks (MAN) = a city

Wide Area Networks (WAN) = a large geographic area (across metropolitan, regional, national or international boundaries)

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Buy Coursework Help
Quality Homework Helper
Writer Writer Name Offer Chat
Buy Coursework Help

ONLINE

Buy Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$62 Chat With Writer
Quality Homework Helper

ONLINE

Quality Homework Helper

Hi dear, I am ready to do your homework in a reasonable price.

$62 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

DUI preventive strategies - MATH - Auditing and other assurance services edition - Research paper - Video literacy narrative - Analyse response - NUR601 MODULE 6 DISCUSSION - Abstract algebra dan saracino pdf - Emerson ups liebert gxt mt+ manual - What is the qualitative-quantitative debate about? - +91*=*9414601882*lOvE marriagE prOblEm sOlutiOn vashikaran in RAtlAm - One drawback of using the yardstick approach to structure business reports is that - Leadership and conflict management presentation soc 110 - 4 day hypertrophy program - Sample case study report in psychology - English literature course syllabus - Identify the reducing agent in the chemical reaction 5fe2+ - Comptia a+ exam objectives 1001 - Week 1 - 95 confidence interval z score - Describe the seven dimensions of organizational culture - Th to f phonological process - 2 identify and document key nursing diagnoses for jennifer hoffman - AB_C_Framework - Sunflower nutraceuticals simulation paper - A Holistic Response to Crime Victimization - Journal Article Analysis - Bloomberg market concepts answer key - Urgent 2 - Poetry explication assignment - How long was tom robinson's sentence - Science current event worksheet answers - 48 108 in simplest form - Olive house bacup reviews - How to make a wayfarer tent - West coast university admissions office excel formulas - Multimedia poetry presentation - The percent of sales method of financial forecasting - In the spot market mexican pesos - What does task interdependence mean in regards to slack - Gender and women's studies critical terrain second edition - Comp xm round 1 answers - Max labs salesforce - Discussion #3A - Initial Post : Child Abuse - Team proposal soc 110 week 5 - As nzs 3760 2012 - Experiment 1: neutralization of acids and bases - Browns hotel london chef - Educational administration and management ppt - Discussions - ACCOUNTING/FINANCE d2 - Correctly written algebraic equation - Vce biology 3/4 study design - Excel application capstone exercise - Geographies of writing!! - 1. what did fred t. korematsu do that resulted in his arrest and conviction? - Electric motor lab answers - Liquid used in manometer - Domain and range of a graph in interval notation - Do and don ts in laboratory ppt - General healthcare technology trends particularly related to data information - Psychology - Public sector service value chain - Southern cross pathology clayton - Science b4 b5 b6 - Week 5 - Assignment: Create a Client's Rights and Responsibilities Pamphlet - Imm 5669 form 2019 - Requiem for a beast - Stage 2: Process Analysis - Unisuper compliance letter 2021 - Centre for arab and islamic studies - Genetics problems monohybrid crosses worksheet answer key - Philip guerin family therapy - Organizational Culture - Question to be answered - Lush business plan - 75d23l mf yuasa power series ultra auto battery - Life magazine 1956 ideal modern woman - Bell case interview - Final fantasy xv negotiation answers - Cloud in a bottle experiment hypothesis - Internal alignment definition - Ferric chloride test aspirin - More experience bigger brain rosenzweig - The circle summary book 2 - Imputability of human acts - Nadar raising photography to the height of art - Rally base drop strategy - Six step troubleshooting process - Caravan storage brierley hill - Persuasive techniques appeal to fear - Community Resources for Older Individuals - Dell fx2 cmc default ip - HRM671 LEARNING THEORIES AND TECHNOLOGY - Hr discussion - Facebook inc the initial public offering case study - Specialised welding products haydock - Medical Nutrition Therapy for Pulmonary Disease - Conversion of celsius to fahrenheit in python - How did glaciation help create the landforms of northern europe