1. Trang chủ
  2. » Giáo Dục - Đào Tạo

24 introducing FW, AP, WLC kho tài liệu bách khoa

14 33 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 14
Dung lượng 655,38 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

BSCI v3.0—2-1Introducing Firewall, Access Point, Wireless Controller... • A firewall is a system or group of systems that enforce an access control policy between two networks.. • Thi

Trang 1

BSCI v3.0—2-1

Introducing

Firewall, Access Point, Wireless Controller

Trang 2

A firewall is a system or

group of systems that

enforce an access control

policy between two networks.

This definition is so loose

that almost anything can be a

firewall:

A packet filtering router

Multiple hosts with

firewalling software

What Is a Firewall?

Good Traffic Bad Traffic

Trang 3

Expanding on the Definition

Firewalls are different things to different people and

organizations.

properties:

The firewall itself is resistant to attacks.

The firewall is the only transit point between networks (all traffic flows through the firewall).

The firewall enforces the access control policy.

Trang 4

Firewall Benefits

A firewall can protect against

Exposure of sensitive hosts and applications to untrusted users

Exploitation of protocol flaws by sanitizing protocol flow

Malicious data being sent to servers and clients

If properly designed, enforcement of policies is simple,

scalable, and robust.

offloading most of the network access control to a couple of points in the network.

Trang 5

Firewall Limitations

Misconfiguration of a firewall can have serious

consequences (single point of failure).

When a user is frustrated by a firewall, they may find ways around the firewall.

Unauthorized traffic can be tunneled (covert channels).

Trang 6

Firewalls in a Layered Defense Strategy

Perimeter security

Secures boundaries between zones

Endpoint security

Provides identity and device security

policy compliance

Disaster recovery

Offsite storage and redundant architecture

Communications security

Provides information assurance

Core network security

Protects against malicious software

and traffic anomalies, enforces

network policies, and ensures

survivability

Trang 7

Access Point

The AP functions as a translational bridge between 802.3 wired media and 802.11

wireless media

Wireless is a

half-duplex environment.

BSA = wireless cell.

BSS is the service provided by the AP.

Trang 8

Access Point (Cont.)

Trang 9

Service Set Identifier

Trang 10

 Extends the AP coverage

 Dual radio can create dual half-duplex

 Overlap of 50% required

 Throughput

impacted when single frequency used

Trang 11

Standalone and Lightweight APs

Trang 12

Cisco Unified Controller-Based Solution

Trang 13

A(config)#ip sla 1

A(config-ip-sla)#icmp-echo 200.0.0.2 source-ip 200.0.0.1

A(config-ip-sla-echo)#frequency 10

A(config-ip-sla-echo)#exit

A(config)#ip sla schedule 1 start-time now life forever

address 200.0.0.2

A(config)#track 1 ip sla 1

Define the tracking of object 1 linked to IP SLA 1.

A(config)#ip route 0.0.0.0 0.0.0.0 200.0.0.2 5 track 1

Announces the default route with gateway IP 200.0.0.2 with

administrative distance of 5 if tracking object 1 is true

Using IP SLA for verifying Internet connection

Ngày đăng: 08/11/2019, 17:16