Bis - Unit 4 1
Bis - Unit 4 1
Y.A.Hathaliya
Lecturer in Computer Engg. Department
A.V.P.T.I, Rajkot
Topics To be Covered
• Security Topologies
▪ Security Zones, DMZ,
▪ Internet, Intranet
▪ VLAN, Security Implication in VLAN
▪ Tunneling.
• Firewalls
▪ Working of Firewall
▪ Need of Firewall
▪ Types of Firewall (Packet Filtering Firewall, Circuit-Level Gateway Firewall,
Application Level Gateway Firewall, Stateful Inspection Firewall, and Next-
Generation Firewall)
• Intrusion detection systems (IDS)
▪ Definition of Intruders
▪ Components of IDS
▪ Types of IDS with Advantages and Disadvantages (HIDS,NIDS)
Security Topologies
• Security Topologies refer to the architectural designs and configurations
used to establish and maintain the security of computer networks and
systems.
• These Topologies are crucial for protecting information, resources, and
infrastructure from unauthorized access, data breaks, and other cyber
threats.
• Different organizations may implement various security topologies based
on their specific requirements, the nature of their operations, and the
sensitivity of the data they handle.
• Example of Security Topologies are.
• DMZ
• Network Segmentation
• VLAN (Virtualization Security)
Security Zones
• Security Zones in network security refer to the concept of dividing a network
into distinct areas, each with its own set of security policies, controls, and
levels of trust.
• This segmentation is designed to enhance overall security by limiting the
scope and impact of security incidents and unauthorized access, each security
zone is treated as a separate entity, and traffic between zones is subject to
specific rules and scrutiny.
• Imagine security zones as rooms in your home, accessible only to specific
family members. For instance, your home office may be restricted, barring
entry for helpers and children, security zones help regulate entry to specific
spaces and ensuring the confidentiality and security of sensitive information.
• Here are some common security zones in network architecture,
▪ DMZ (Demilitarized Zone)
▪ Remote Access Zone
▪ Internal Zone
▪ Guest Network Zone
▪ VPN Zone
DMZ
• Demilitarized Zone (DMZ) is a network security
concept that involves creating a separate,
intermediate network segment between an
organization's internal network (trusted
network) and an external network (untrusted
network), typically the internet.
• The purpose of a DMZ is to provide an
additional layer of security by segregating
public-facing services, such as web servers,
email servers, or FTP servers, from the internal
network where sensitive data is stored.
• In the context of cybersecurity, a DMZ acts as a
buffer zone that helps protect internal
resources from direct exposure to the internet,
It often contains firewalls, intrusion
detection/prevention systems, and other
security appliances to monitor and control
traffic entering and leaving the network.
• The basic figure of DMZ are depicted below,
• Characteristics/Application of DMZ are;
• Segregation of Services
▪ DMZ allows organizations to segregate their public-facing services, such as
web servers, email servers, or FTP servers, from their internal network.
▪ This separation helps in containing potential security breaches and limiting
their impact to only the DMZ.
• Enhanced Security
▪ By placing critical services in the DMZ, organizations can implement stricter
security measures for these services
• Restricted Access
▪ Access controls are typically implemented to restrict traffic flow between the
DMZ and internal networks.
▪ Only specific types of traffic necessary for the operation of public-facing
services are allowed, while all other traffic is blocked or carefully scrutinized.
• Web Servers
▪ Hosting web servers in the DMZ allows external users to access a company's
website without directly connecting to the internal network, safeguarding
sensitive data.
• Email Servers
▪ Placing email servers in the DMZ ensures that external communications,
such as emails from clients or partners, are processed in a secure
environment before reaching the internal network.
• FTP Servers
▪ File Transfer Protocol (FTP) servers in the DMZ facilitate secure file
transfers between internal and external networks.
• DNS Servers
▪ Domain Name System (DNS) servers in the DMZ handle external DNS
requests, separating this critical service from the internal network to
prevent potential attacks.
• Authentication Services
▪ Placing authentication services in the DMZ allows external users to
authenticate without gaining direct access to internal user databases,
enhancing security.
• Virtual Private Network (VPN) Servers
▪ DMZs are commonly employed to host VPN servers, enabling secure
remote access for external users without compromising the internal
network's integrity.
• Intrusion Detection and Prevention
• Scalability and Flexibility
• Monitoring and Logging
• Advantages of DMZ are;
• Enhanced Security
• Provide Controlled Access
• Scalability and Flexibility
• Centralized Management and Monitoring
• Support for Remote Access