SlideShare une entreprise Scribd logo
1  sur  15
Implementing a
basic network.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certification
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Plan the network.
– Configure the network.
PACE-IT.
Page 4
Implementing a basic network.
Page 5
Need a simple SOHO? Great,
just plug two PCs into a single
hub and you have a basic
network. But does it achieve
what you want?
How do you know without a plan? A network plan is vital
when implementing any network more complicated than
the most basic. The plan should cover what you are
hoping to achieve and how you are going to get there. In
addition to your expertise, you are also going to need
input from your end users. Nothing is quite so frustrating
as delivering the network and having customers tell you it
is not what they wanted.
Implementing a basic network.
Page 6
– List of requirements.
» Define why the network is needed.
» Define what network features are required.
» Define the scope of the network.
» Establish a budget to implement the network.
– Network design.
» What equipment is needed to implement the network?
» How will the network be organized?
» How will shared resources be placed on the network?
– Compatibility issues.
» What standards are in play now and what standards will there
be in the future?
» Does any current equipment require specific cabling or
connection types?
Implementing a basic network.
Page 7
– Internal connections.
» How many node connections will be required?
» How will future expansion be planned?
– External connections.
» How will the network connect to the outside?
– Network equipment placement.
» Is there a wiring/equipment closet?
» What environmental considerations are there for the placement
of equipment?
– How will network security be
implemented?
» Are there firewall type and placement considerations?
» Will VLANs be required and, if so, how many?
» How will port security be implemented?
Implementing a basic network.
Page 8
Implementing a basic network.
Page 9
– Network configuration considerations.
» How clients will receive their IP addresses:
• Using static IP address configuration creates more security,
but is harder to manage.
• Using Dynamic Host Configuration Protocol (DHCP) to
automatically assign IP addresses from a pre-configured pool.
» MAC filtering will only allow specified MAC addresses onto the
network. It is an effective security measure, but it can be
difficult to control.
» A demilitarized zone (DMZ) will be required if a server will be
hosted on the network that needs to be accessed from outside
the network (e.g., a Web server).
• The DMZ is an area of the network in which outside
connections are allowed, while the internal network remains
protected.
• A DMZ will require a custom configuration of the firewall; in
most implementations, two firewalls are used.
Implementing a basic network.
Page 10
– Network configuration considerations
continued.
» Firewall placement and configuration considerations:
• Most SOHO WAN connection devices include firewall
services that are sufficient in most cases.
• If a DMZ needs to be deployed, the best method is to
introduce an additional router and firewall into the network,
with the DMZ residing between the WAN equipment and the
new router/firewall combination.
• If a DMZ is deployed, port forwarding should also be used at
the router/firewall level.
» Router/firewall configuration considerations:
• In the situation of a DMZ or hosted service, port forwarding
needs to be configured.
• Port forwarding is used to direct requests for specific
resources (like a request for a Web page) to the computer
that has the resource.
Implementing a basic network.
Page 11
– Wireless network configuration
considerations.
» The name of the wireless network will need to be determined;
this is called the service set identifier (SSID).
• The SSID can be set to broadcast in the clear.
• The SSID can alternatively be set for the broadcast to be
hidden.
» Encryption needs to be turned on (by default wireless routers
and WAPs do not have encryption enabled) and, at the
minimum, WPA2-Personal should be enabled.
» Some wireless networking equipment comes with Wi-Fi
Protected Setup (WPS) enabled by default. This should be
turned off and not used, as it creates a weakness in the
wireless network.
• WPS can be easily exploited by an attacker.
Implementing a basic network.
Page 12
The network that you
implement may not be
exactly what you planned,
so document any changes to
the plan.
Undoubtedly, during the process of implementing
the plan, some changes will be introduced—either
by you or at the request of the end users. Always
document the changes to the plan and the reasons
for them. Then, be sure to incorporate those
changes into the final network documentation.
Implementing a basic network.
Page 13
Implementing a basic network.
A network plan is vital when implementing any network more complicated
than the most basic one. At the minimum the plan should include a list of
requirements, a network design, compatibility considerations, a list of
internal and external connections, a list of where equipment will be placed,
and a means of implementing security.
Topic
Plan the network.
Summary
Configuration considerations include IP address assignment, MAC filtering,
DMZ configuration (when required), firewall placement and configuration,
and router configuration. For wireless networks, additional configuration
considerations include: SSID (network’s name), SSID broadcast type, and
encryption method.
Configure the network.
Page 14
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

Contenu connexe

Tendances

Pace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_swPace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_swEdward Sargent
 

Tendances (20)

PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Network Monitoring (part 1) - N10 006 PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Network Monitoring (part 1) - N10 006
 
PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006 PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006
 
PACE-IT: Intro to the DNS Service - N10 006
PACE-IT: Intro to the DNS Service - N10 006 PACE-IT: Intro to the DNS Service - N10 006
PACE-IT: Intro to the DNS Service - N10 006
 
PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Network Infrastructure Implementations - N10 006 PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Network Infrastructure Implementations - N10 006
 
PACE-IT: Introduction to IPv6 - N10 006
PACE-IT: Introduction to IPv6 - N10 006 PACE-IT: Introduction to IPv6 - N10 006
PACE-IT: Introduction to IPv6 - N10 006
 
PACE-IT: DHCP in the Network - N10 006
PACE-IT: DHCP in the Network - N10 006 PACE-IT: DHCP in the Network - N10 006
PACE-IT: DHCP in the Network - N10 006
 
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006
 
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006 PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
 
PACE-IT: Storage Area Networks - N10 006
PACE-IT: Storage Area Networks - N10 006PACE-IT: Storage Area Networks - N10 006
PACE-IT: Storage Area Networks - N10 006
 
PACE-IT: Network Cabling (part 2) - N10 006
PACE-IT: Network Cabling (part 2) - N10 006 PACE-IT: Network Cabling (part 2) - N10 006
PACE-IT: Network Cabling (part 2) - N10 006
 
PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006 PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 3) - N10 006
 
PACE-IT: Introduction to IPv4 (part 1) - N10 006
PACE-IT: Introduction to IPv4 (part 1) - N10 006 PACE-IT: Introduction to IPv4 (part 1) - N10 006
PACE-IT: Introduction to IPv4 (part 1) - N10 006
 
Pace IT - Types of Networks
Pace IT - Types of NetworksPace IT - Types of Networks
Pace IT - Types of Networks
 
Pace IT - Tools for Working on Networks
Pace IT - Tools for Working on NetworksPace IT - Tools for Working on Networks
Pace IT - Tools for Working on Networks
 
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
 
PACE-IT: Network Topologies - N10 006
PACE-IT: Network Topologies - N10 006 PACE-IT: Network Topologies - N10 006
PACE-IT: Network Topologies - N10 006
 
Pace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_swPace it data-disposal_and_destruction_methods_bf_sw
Pace it data-disposal_and_destruction_methods_bf_sw
 
PACE-IT: Wireless LAN Infrastructure (part 2)
PACE-IT: Wireless LAN Infrastructure (part 2)PACE-IT: Wireless LAN Infrastructure (part 2)
PACE-IT: Wireless LAN Infrastructure (part 2)
 
Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)
 
Pace IT - Client Networking (Part 1)
Pace IT - Client Networking (Part 1)Pace IT - Client Networking (Part 1)
Pace IT - Client Networking (Part 1)
 

Similaire à PACE-IT: Implementing a Basic Network - N10 006

PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPace IT at Edmonds Community College
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
 
A Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptx
A Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptxA Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptx
A Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptxYousef Al-Mutayeb
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp ciscoJheyson Ayala
 
MasterCapstoneV9
MasterCapstoneV9MasterCapstoneV9
MasterCapstoneV9Tracy Payne
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxericbrooks84875
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Deepak Shankar
 
Sambit kumar nayak resume
Sambit kumar nayak resumeSambit kumar nayak resume
Sambit kumar nayak resumeSambit Nayak
 

Similaire à PACE-IT: Implementing a Basic Network - N10 006 (20)

Pace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO NetworkPace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO Network
 
PACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security ConsiderationsPACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security Considerations
 
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and Components
 
Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 2)Pace IT - Client Networking (Part 2)
Pace IT - Client Networking (Part 2)
 
Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 
Pace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless NetworksPace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless Networks
 
PACE-IT: The Importance of Network Segmentation
PACE-IT: The Importance of Network SegmentationPACE-IT: The Importance of Network Segmentation
PACE-IT: The Importance of Network Segmentation
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
A Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptx
A Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptxA Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptx
A Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptx
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp cisco
 
MasterCapstoneV9
MasterCapstoneV9MasterCapstoneV9
MasterCapstoneV9
 
En35793797
En35793797En35793797
En35793797
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
PACE-IT: Common Threats (part 2)
PACE-IT: Common Threats (part 2)PACE-IT: Common Threats (part 2)
PACE-IT: Common Threats (part 2)
 
Week2
Week2Week2
Week2
 
Pace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bfPace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bf
 
PACE-IT: Troubleshooting Common Network Issues
PACE-IT: Troubleshooting Common Network IssuesPACE-IT: Troubleshooting Common Network Issues
PACE-IT: Troubleshooting Common Network Issues
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 
Sambit kumar nayak resume
Sambit kumar nayak resumeSambit kumar nayak resume
Sambit kumar nayak resume
 

Plus de Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 

Plus de Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

PACE-IT: Implementing a Basic Network - N10 006

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certification  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Plan the network. – Configure the network. PACE-IT.
  • 4. Page 4 Implementing a basic network.
  • 5. Page 5 Need a simple SOHO? Great, just plug two PCs into a single hub and you have a basic network. But does it achieve what you want? How do you know without a plan? A network plan is vital when implementing any network more complicated than the most basic. The plan should cover what you are hoping to achieve and how you are going to get there. In addition to your expertise, you are also going to need input from your end users. Nothing is quite so frustrating as delivering the network and having customers tell you it is not what they wanted. Implementing a basic network.
  • 6. Page 6 – List of requirements. » Define why the network is needed. » Define what network features are required. » Define the scope of the network. » Establish a budget to implement the network. – Network design. » What equipment is needed to implement the network? » How will the network be organized? » How will shared resources be placed on the network? – Compatibility issues. » What standards are in play now and what standards will there be in the future? » Does any current equipment require specific cabling or connection types? Implementing a basic network.
  • 7. Page 7 – Internal connections. » How many node connections will be required? » How will future expansion be planned? – External connections. » How will the network connect to the outside? – Network equipment placement. » Is there a wiring/equipment closet? » What environmental considerations are there for the placement of equipment? – How will network security be implemented? » Are there firewall type and placement considerations? » Will VLANs be required and, if so, how many? » How will port security be implemented? Implementing a basic network.
  • 8. Page 8 Implementing a basic network.
  • 9. Page 9 – Network configuration considerations. » How clients will receive their IP addresses: • Using static IP address configuration creates more security, but is harder to manage. • Using Dynamic Host Configuration Protocol (DHCP) to automatically assign IP addresses from a pre-configured pool. » MAC filtering will only allow specified MAC addresses onto the network. It is an effective security measure, but it can be difficult to control. » A demilitarized zone (DMZ) will be required if a server will be hosted on the network that needs to be accessed from outside the network (e.g., a Web server). • The DMZ is an area of the network in which outside connections are allowed, while the internal network remains protected. • A DMZ will require a custom configuration of the firewall; in most implementations, two firewalls are used. Implementing a basic network.
  • 10. Page 10 – Network configuration considerations continued. » Firewall placement and configuration considerations: • Most SOHO WAN connection devices include firewall services that are sufficient in most cases. • If a DMZ needs to be deployed, the best method is to introduce an additional router and firewall into the network, with the DMZ residing between the WAN equipment and the new router/firewall combination. • If a DMZ is deployed, port forwarding should also be used at the router/firewall level. » Router/firewall configuration considerations: • In the situation of a DMZ or hosted service, port forwarding needs to be configured. • Port forwarding is used to direct requests for specific resources (like a request for a Web page) to the computer that has the resource. Implementing a basic network.
  • 11. Page 11 – Wireless network configuration considerations. » The name of the wireless network will need to be determined; this is called the service set identifier (SSID). • The SSID can be set to broadcast in the clear. • The SSID can alternatively be set for the broadcast to be hidden. » Encryption needs to be turned on (by default wireless routers and WAPs do not have encryption enabled) and, at the minimum, WPA2-Personal should be enabled. » Some wireless networking equipment comes with Wi-Fi Protected Setup (WPS) enabled by default. This should be turned off and not used, as it creates a weakness in the wireless network. • WPS can be easily exploited by an attacker. Implementing a basic network.
  • 12. Page 12 The network that you implement may not be exactly what you planned, so document any changes to the plan. Undoubtedly, during the process of implementing the plan, some changes will be introduced—either by you or at the request of the end users. Always document the changes to the plan and the reasons for them. Then, be sure to incorporate those changes into the final network documentation. Implementing a basic network.
  • 13. Page 13 Implementing a basic network. A network plan is vital when implementing any network more complicated than the most basic one. At the minimum the plan should include a list of requirements, a network design, compatibility considerations, a list of internal and external connections, a list of where equipment will be placed, and a means of implementing security. Topic Plan the network. Summary Configuration considerations include IP address assignment, MAC filtering, DMZ configuration (when required), firewall placement and configuration, and router configuration. For wireless networks, additional configuration considerations include: SSID (network’s name), SSID broadcast type, and encryption method. Configure the network.
  • 15. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.