-
Essay / Building a Secure Network - 788
Building a Secure NetworkArchitecting and designing a secure network is a very complex and detailed process. This requires an experienced hand for developing and implementing the network diagram. A network diagram is a graphical representation containing your basic equipment, IP addresses, ISP, host machines, and devices. Most network diagrams for SOHO networks are the same but may differ depending on business needs. This background will describe and explain the design considerations to take into account in creating a secure network. The first step in creating a secure network is to create the network topology. Topology is a physical and logical layout of the network. This is the DNA and basis of network design. A basic network will contain an Internet Service Provider (ISP) router, border router, firewall, switches, servers, and local hosts. The ISP is connected to the border router. The border router is the exterior/interior router. The outside is the public interface and the inside is the private interface. The border router is the first line of defense for traffic entering and exiting the network. The router must be configured correctly to mitigate vulnerabilities originating from the network. Router passwords must be strong. The password should not be a common word. They must be alphanumeric with symbols and more than 8 characters. It is necessary to consider which IP addresses are allowed to send and receive externally. IP tables are built within the router. These tables contain access lists that will filter all incoming and outgoing traffic outside of a network. Static routing with the router is a good practice because it mitigates DDos attacks. Router interfaces no...... middle of paper ......acks. These systems have been integrated into firewalls. Snot is a free IDS that can be downloaded for free. Wireshark is a packet analyzer that captures and displays data packets. This tool helps users see a data packet and check if it has been tampered with. It is used in conjunction with SNORT. Building and designing a network can be a long and tedious task. The time and development of security policies is a process that can equal the time of creating the network topology. Security implementations to secure infrastructure should be based on best practices. Network administrators and users must all become a cohesive force in protecting the network. /whitepapers/bestprac/designing-secure-local-area-network-853 http://www.vicomsoft.com/learning-center/firewalls/