preview

Designing A Well Secure Solution

Decent Essays

Comprehensive and Secure Solution In order to design and construct a well-secured network, many features must be taken into consideration, such as the topology and placement of hosts within the network, the selection of hardware and software technologies, and the successful arrangement of each component. I will discuss securing a LAN from the viewpoint of the network architect considering two main areas: the network topology which comprises the physical and logical design of the network; and securing the routers and switches which connect segments and hosts to form the network.
Initial Assumptions and Challenges
Finding some of the best practices and examining some of the security issues found in small to medium sized networks is a …show more content…

Topology and Architecture
Topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Essentially, it is the structure of a network and may be depicted physically or logically. On the physical side, a network needs provide distribution to the offices or buildings where the users are located.
In laying out the logical topology we need to consider the arrangement of devices on the network. The way data is moved across the network may include which groups of users and devices should be grouped alongside which parts of the network are trusted. The diagram below lays out the proposed network design. The design includes one router connected to the internet, a core router, a firewall, an intranet switch, three workgroup switches, multiple workstations, and servers. If the business wanted to consider more advanced management of the network from an IT perspective we propose adding a few management workstations and servers as well as setting up a management VLAN (virtual LAN). The management VLAN will operate on a separate VLAN from the regular user traffic.
Security
A hacker looks for poorly configured network devices. Common vulnerabilities include information gathering, sniffing, spoofing, and denial of service. As you see in our diagram, we propose to implement several points of protection,

Get Access