Professional Documents
Culture Documents
Ejercicio3 Expo Planning Network Security
Ejercicio3 Expo Planning Network Security
Last names:
Firts Name:
Number list:
EXPOSITION # 1
Exposition 30%
Pronunciation 40%
Vocabulary 10%
Writing 10%
Order before, during and after practice 10%
100100
To learn more about how to develop a network security policy, see the chapter on IP security in
the IP Network Design Guide.
Data integrity, which prevents attacks that are based on ill-formed data
Replay protection, which prevents attacks that are based on replaying messages
Secure creation and automatic refresh of encryption keys
Strong cryptographic algorithms
Certificate-based authentication
IPSec includes several protocols that each perform one of these functions. Many security products
use IPSec as a foundational architecture.
To learn more about IPSec, see the chapter on IP security in the IP Network Design Guide.
remote nodes of the corporate network for communication between remote users, branch offices,
and corporate partners.
To learn more about how to implement a VPN, see the chapter on IP security in the IP Network
Design Guide.
To learn how to prevent virus and spyware infections, see the chapter on IP security in the IP
Network Design Guide.
When you have completed these tasks, you should have a network security plan that identifies
these elements:
Record a network security policy, which includes firewalls, demilitarized zones, access rules for
sensitive information, authentication, encryption, and counter-social engineering training.
Record a topology of your security architecture, which includes the areas that require
authenticated access, areas that are protected by firewalls, areas where your demilitarized
zones are connected, and which remote users or offices use VPNs.
Record a list of antivirus and anti-spyware applications that you plan to load on host machines.
Develop a policy for weekly updates and configure the hosts to automatically run the
applications at least weekly.
You can have fast servers and workstations, but if the data traffic between them is slow, the whole
enterprise is slow. Therefore, it is important to plan your network bandwidth to match the speed
of your business.
Overloaded routers
Routers can significantly slow traffic if more hosts are connected to them than they can reasonably
handle. You can either upgrade upgrading the router or convert to a smart switch.
Outdated servers
Some network administrators put older servers on the front end because the data flow is not as
critical as it is in the back end. But, older servers might not be able to keep up with graphics-
intensive user applications, such as Flash programs that run over the Web, and users may become
frustrated by waiting for applications to load.
To learn more about how to improve network performance, see the chapter on multicasting and
quality of service in the IP Network Design Guide.
QoS works like the high-occupancy commuting lanes that are on highways. Special lanes are set up
for traffic, vehicles with two or more passengers per car, so they can arrive at their destinations
faster by not getting stuck in traffic in the slower lanes. Similarly, with QoS, the network gives
priority to certain data packets and ensures that they arrive at their destinations within a certain
time frame. Like multicasting, planning for QoS must include the entire network topology. If you
plan to implement QoS, review the network software and hardware planning steps and
incorporate prioritized traffic protocols throughout your topology.
When you have completed these tasks, you should have a network performance plan that
identifies these elements: