Building a Secure Network The architecture and design of building a secure network is a very complex and detailed process. It requires an expert hand for developing and implementing the network diagram. A network diagram is a graphical representation containing backbone equipment, IP addresses, ISP, host machines, and peripherals. In most cases all network diagrams for SOHO networks are the same but may differ depending on the needs of the company. This context will describe and explain the design considerations that should be taken into account when building a secure network. The first step in building a secure network is creating the network topology. Topology is a physical and logical layout of the network. It is the DNA and basis of network design. A basic network will contain an Internet Service Provider (ISP) router, a border router, a firewall, switches, servers, and local hosts. The ISP is connected to the border router. The border router is the external/internal router. The outside is the public interface and the inside is the private interface. The border router is the first line of defense for traffic entering and leaving the network. The router must be configured correctly to mitigate vulnerabilities entering the network. Passwords for the router should be complex. The password should not be a common word. They should be alphanumeric with symbols and more than 8 characters. You need to consider which IPs can send and receive from the outside. IP tables are built inside the router. These tables contain access lists that will filter all incoming and outgoing traffic outside a network. Static routing with your router is a good practice because it alleviates DDoS attacks. Router interfaces do not… half of the paper… match. These systems are integrated inside firewalls. Snot is a free IDS that can be downloaded for free. Wireshark is a packet analyzer that captures and displays data packets. This tool helps users see a data package and check for tampering. It is used together with SNORT. Building and designing a network can be a long and tedious task. The time and development of security policies is a process that can equal the time of creating the network topology. Security implementations to protect infrastructure must be based on best practices. Network administrators and users must all become a cohesive force in protecting the network. Works cited http://msdn.microsoft.com/en-us/library/ff648651.aspx http://www.sans.org/reading-room /whitepapers/bestprac/designing-secure-local-area-network-853 http://www.vicomsoft.com/learning-center/firewalls/
tags