Information Security Week 04
Information Security Week 04
Week 04
INFOSEC Network
Architecture Design Rules
If you are installing a large network, then you may have to create more than one
network segment.
Practically, if there are a very large number of nodes on an Ethernet network, then
separate physical networks must be created.
These separate networks can be connected together via a router.
Such a large network space increases the risk of network security problems.
Therefore, traffic between separate networks must be restricted only to those systems
that need to access data.
This limited access will decrease the number of users that may compromise each
separate physical network.
5.1 Physical Separation
1. Restrict access:
Securing your network from the internet and other external communication links
requires that your site have a firewall that properly isolates the external network from
your internal network.
A firewall is a device or collection of devices and software that securely connects a
trusted network with an untrusted or public network.
Packets must flow past the firewall and be controlled by the firewall by a set of rules
that authorize packets to pass between the two networks.
Rules are set up at the firewall to enforce the site’s security policy.
5.3 FIREWALL ARCHITECTURE (cont)
Mail servers are needed for intranet mail communications within your organization and for
sending mail to other organizations over the internet.
Since users on the internet can send you mail, locate this mail server on the DMZ and
protect this system with extra security measures.
Disable FTP on the mail server and set up file protection.
For restricted mail communication between known sites, set up secure authentication
between servers.
5.3 FIREWALL ARCHITECTURE
Choose a firewall software package that has been favorably reviewed by the NCSA.
Use a proxy server located on the DMZ to hide the internal IP addresses from external
users.
Filter out incoming packets from the Internet that have source addresses belonging to
the internal network.
Block all IP traffic into the internal network except from authorized sources.
5.3 FIREWALL ARCHITECTURE
Do not connect computers with extremely sensitive information to the internet, even
indirectly using a firewall.
5.4 WAN-BASED NETWORK
ARCHITECTURE
Locate all WAN connections on a central hub that is separated from public
communication links by a firewall.
Use a Virtual Private Network (VPN) over the internet between two sites in place of a
leased line connection for less sensitive site-to-site communications.
Use hubs to isolate traffic in order to make it more difficult for hackers to perform
sniffing of the network.