Building a secure network

Better Essays
Building a Secure Network
The architecture and build design of a secure network is a very intricate and detailed process. It requires a seasoned hand for the development and implementation of the network diagram. A network diagram is a graphical representation containing your backbone equipment, IP addresses, ISP, host machines, and peripherals. Mostly all network diagrams for SOHO networks are the same but may different depending upon the needs of the company. This context will describe and explain the design considerations that should go into building a secure network.
The first step in building secure network is creating the network topology. The topology is a physical and logical layout of the network. It is the DNA and basis of network design. A basic network will contain an Internet Service Provider (ISP) router, boundary router, firewall, switches, severs, and local hosts. The ISP is connected to the border router. The border router is the outside/inside router. The outside is public interface and the inside is the private interface. The boundary router is the first line of defense for traffic coming inside and going outside the network. The router must be configured properly to mitigate the vulnerabilities coming inside the network. The passwords for the router should be strong. Password should not be a common word. They should be alpha numeric with symbols and more than 8 characters. One must consider what ip’s are allowed to send and receive from the outside. IP tables are constructed within the router. These tables contain access lists which will filter the all traffic inbound and outbound outside in a network. Static routing with the router is a good practice it alleviates DDos attacks. Router interfaces not ...

... middle of paper ...

...acks. These systems have integrated within firewalls. Snot is free IDS that can be downloaded for free. Wireshark is a packet analyzer that to captures and displays the data packets. This tool helps users see a data packet and check it for tampering. It is used in conjunction with SNORT.
Building and Designing a network can long and tedious task. The time and development of security policies is a process that can equal the creation time of the network topology. The security implementations to secure the infrastructure must be based of best practices. Network administrators and users all must become a cohesive force in the protection of the network.

Works Cited
Get Access