preview

Nt2580 Unit 3

Decent Essays

There are multiple aspects of security in this network, which I have tried to implement as much as possible. This is where the CIA triangle comes into play, confidentiality, rules and limits to access information; Integrity, making sure the data is accurate and trustworthy; Availability, having reliable access to the information. I am going to talk about each aspect in a list format and explain how it’s used in my network. One thing that will be performed on all network devices is system updates and patches. They will happen on a monthly basis, on a weekend when the networks are not being used.

• Closets o All main networking, router, switches and servers will be in a closet that is only accessible to the networking team, this way it’s not …show more content…

o Routers will have firewalls on them checking whether or not the information coming onto the network is allowed. o Only the ports being used on the network will be turned on, all un-used ports will be administratively down. o Each IP that accesses the internet will be under a NAT protocol to help protect the users accessing the internet. o Routers will have ACLS to allow the different Vlans to talk to each other
• Switches o In order to access the switches via console cable or telnet or ssh you will need two different passwords that will be unique to each building. That way if someone gets ahold of the passwords they only have access to a small part of the network. o Each switch will have an interface Vlan with a special IP subnet so it users won’t be able to ping the specific devices to map the network. o All ports that are used will have access to only one Vlan. o Only the ports being used on the network will be turned on, all un-used ports will be administratively down. o Un-used ports will also be on a “dead” Vlan so someone will have no way to manipulate the current

Get Access