Network security is a critical aspect of your network planning. Your network connection must securely allow legitimate traffic through the door while keeping illegitimate traffic out.
Before you begin your network security planning tasks, complete these tasks.
Before you begin | |
---|---|
__ | Develop a list of all of the points of entry into your network. |
__ | Create a corporate security policy that network security policy will follow. Include policies about access to confidential and sensitive information, what actions are taken in the event of a breach, and by whom. |
Network security planning tasks | |||
---|---|---|---|
__ | Develop a network security
policy You can develop a network security policy by starting
with your corporate security policy, develop a network security policy. These
elements are recommended for your plan:
To learn more about how to develop a network security policy, see the chapter on IP security in the IP Network Design Guide. |
||
__ | Plan for IP Security Architecture IP Security Architecture (IPSec) is an open, standards-based security architecture that provides these features:
To learn more about IPSec, see the chapter on IP security in the IP Network Design Guide. |
||
__ | Plan for virtual private networks Virtual private networks (VPNs) use IPSec to create a secure, private connection, or tunnel, through a public network such as the Internet. You can use several tools on each platform to turn ordinary Internet connections into VPNs. VPNs encrypt and authenticate information between remote nodes of the corporate network for communication between remote users, branch offices, and corporate partners. To learn more about how to implement a VPN, see the chapter on IP security in the IP Network Design Guide. |
||
__ | Plan for virus and spyware
protection Viruses and other harmful software, called malware, disguises itself as legitimate business content, only to run malicious activity after it is inside the company network. Malware is the most pervasive form of network security breach. Each host on your network should be equipped with antivirus and antispyware applications that are updated weekly and run at least weekly. These programs are designed to block malware before it can replicate themselves over your network. To learn how to prevent virus and spyware infections, see the chapter on IP security in the IP Network Design Guide. |
When you have completed these tasks, you should have a network security plan that identifies these elements:
__ | Record a network security policy, which includes firewalls, demilitarized zones, access rules for sensitive information, authentication, encryption, and counter-social engineering training. |
__ | Record a topology of your security architecture, which includes the areas that require authenticated access, areas that are protected by firewalls, areas where your demilitarized zones are connected, and which remote users or offices use VPNs. |
__ | Record a list of antivirus and anti-spyware applications that you plan to load on host machines. Develop a policy for weekly updates and configure the hosts to automatically run the applications at least weekly. |