Assignment 2 Task C-D-E
Assignment 2 Task C-D-E
SPAN and RSPAN Monitored Traffic, SPAN or RSPAN source port you
can monitor source ports or VLANs for
traffic in one or both directions.
TACACS+ or RADIUS for AAA Controlling access to who can login to a network
implementation device console, telnet session, secure shell (SSH)
session, or other method
SPAN copies traffic from one or more source ports in any VLAN or Monitor packets received by
from one or more VLANs to a destination port for analysis. RSPAN the VLAN before any
enabling remote monitoring of multiple switches across your modification or processing is
network performed by the switch.
Designed to enable authentication and authoriation per user or per Implement AAA server across
service. After logging into a system, the user may try to issue network
commands. The authorization process determines whether the user
has the authority to issue such commands.
The user authentication mechanisms supported for SSH are RADIUS, Enable encrypted connection
TACACS+ and the use of locally stored user names and passwords. to a Cisco router
SSH allows a strong encryption to be used with the Cisco IOS
software authentication.
Configuring basic router port security. OOB can deliver serial Implement a dedicated
console access, primarily for internetworking devices such as management interfaces and
switches, firewalls, load balancers and routers. securing port interfaces
Having a separate instance of STP per VLAN makes the network Use PVST to reduce the scope
more resilient to attacks against spanning tree. If a problem occurs in of possible damage.
one VLAN, the effects are contained in that VLAN, shielding the rest
of the network.
Trunking feature can easily be abused to set up an illegitimate Disable Vlan Dynamic
trunk. Dynamic trunking should be disabled on all ports connecting Configuration on user ports,
to end users. use MD5 instead and Use a
dedicated VLAN ID for all
trunk ports
The interface that sits between a trusted network segmentand an Isolating all unknown Internet
untrusted network segment, providing physical isolation between requests to the servers on the
the two networks enforced by a series of connectivity rules within DMZ and no longer allowing
the firewall. them into your internal
network
Assignment 2 Task D
Service High Availability
Name
Internet Multihoming
Redundant connections
QoS
Triangle Topologies
Spanning-tree protocol
Link aggregation
Stateful NAT
Tech. Specifications Description of HA
1. Failover (in case one ISP connection is down) 2. Connecting to Two ISPs to avoide
Load Balancing (Utilize multiple routes to forward packets from the single point failure
and to Internet)
Redundant connections to the core for fastest convergence and redundant connection eliminate
to avoid black holes. Redundancy LAN by installing two switches network downtime caused by a
and making them the default gateway single point of failure and enhance
reliability.
Prioritization of mission-critical network traffic. you can use QoS Access switches require QOS for
to reduce the priority of unwanted traffic Appropriate trust policies, marking
policies and queing policies
For layer 3 build triangles not squares for deterministic If a device goes down the network
convergence has to rely on flooding of updates
before it can converge. Using
triangle, there are already dual
paths so losing one won’t affect
convergence and the other route
STP lets the network deterministically block interfaces and is already in the FIB so traffic can
provide a loop-free topology in a network with redundant links keep flowing.
Wired Security Secure device access by Disable Telnet and HTTP; Enforce basic edge
limiting accessible ports, allow SSH and HTTPS. Make system proper security
authentication for access, use of MD5 authentication. configurations.
specifying policy for Enable Netflow and NTP
permitted action and proper
logging of events.
Remote Access Implemented SSL or IPsec Provide secure access to Access control policies
VPN VPN with access clients. remote workers may also be enforced
to limit access to only
the necessary
resources and
according to the user's
role.
DMZ DMZ by restricting incoming Firewalls provide stateful These firewall are
access to the public services access control and deep configured to enforce
and by limiting outbound packet inspection access policies and
access from DMZ resources keep track of
out to the Internet. connection status to
protect the network.
Border router Border router route traffic This is the first line of border router will be
between the organization's defense against external configured to block the
network and the Internet. attacks. most obvious traffic
Primary to protect inside and forward the rest to
devices. their respective point
devices inside the
enterprise DMZ