Examples Of Personal Cause And Effect Essay Topics For College Students
Wednesday, May 6, 2020
Network and Security Tracer Network Simulator.
Question: Discuss about the Network and Security for Tracer Network Simulator. Answer: IDS, IPS, and HIPS IDS are used in the network diagram in between the client side and the internal network components. The IDS is attached with the HUB or Switch attached with a specified PORT address of the switch. The main function of the IDS is to track the suspicious activities taking place in the network; it identifies the traffic and data transmission in the network and identifies the vulnerability of the network towards the attack (Jesin 2014). The IDS can be used in between the switch0, switch1, switch2 and switch3, switch4, switch5, switch6 in the left side of the network and in between switch7, switch8, switch9 and switch10, switch11, switch12, switch 13. IPS (Intrusion Prevention System) is the next level of IDS (Intrusion Detection System) and has the capability of securing all the levels such as the operating system used or the data packets in the network. It consists of the policies that are used with the IDS which alert the network administrator about any suspicious activities but the administrator can take action depending on the type of attack (Prasad et al. 2016). Since the IPS has all the features of IDS it is considered as the next level of IDS and it can be used in the place of IDS i.e. between the client and the internal network components. In the given network diagram it can replace the IDS or it can be placed along with the IDS to provide better security in between switch0, switch1, switch2 and switch3, switch4, switch5, switch6 in the left side of the network and in between switch7, switch8, switch9 and switch10, switch11, switch12, switch 13. HIPS (Host-based Intrusion Prevention System) is used to protect the servers and workstations of the network. It uses the application software of the system and configures it identify the rules used for protection against any intrusion attacks (Lin 2012). The HIPS catches any suspicious activity occurring on the network and checks the rules set for any intrusion attack and either block or allows depending on the rules (Santos and Stuppi 2015). Thus in the given network diagram the HIPS can be placed in between the servers and the switch connecting the servers i.e. in between the switch0 and server 2 and server3 and server1 and server0 and switch7. This would protect the servers from any intrusion attacks. In the given network diagram static IP is assigned to all the end devices and the servers are configured as a DHCP server. The client end switches and the other switches in the network are protected with password cisco, such that the client cannot reach the router and the other network components. PC0, PC1, PC2, PC3 can communicate between PC10, PC11, PC12, PC13 since they are connected with the router0. PC4, PC5, PC6, PC7 can communicate with the PC8, PC9, PC14, PC15 and they are connected with the router1. The LANs are designed to protect against layer 2 attack, for this type of protection the concept of vlan is used. References Jesin, A., 2014.Packet Tracer Network Simulator. Packt Publishing Ltd. Lin, T., 2012. The design and implementation of company network security architectures. Prasad, N.H., Reddy, B.K., Amarnath, B. and Puthanial, M., 2016. Intervlan Routing and Various Configurations on Vlan in a Network using Cisco Packet Tracer.International Journal for Innovative Research in Science and Technology,2(11), pp.749-758. Santos, O. and Stuppi, J., 2015.CCNA Security 210-260 Official Cert Guide. Cisco Press.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.