Case Study Raj Kumar Thopicharla 002-81-5477 1. You should submit a network drawing listing the network’s topology including any necessary hardware. Network components Amount Router 8 Firewall 16 Multilayer-switch 4 Switch 8 Access-point 2 Workstation 1400 Server 20 2. You should list any recommended cable. These are necessary cables to implement the network design: -Copper straight-through Cat 6 Ethernet -Copper cross over Cat 6 Ethernet - OC-3c Fiber optic multimode 155 mbps 62.5/125 µm 3. You can recommend wiring closets wherever you need them. Each floor at both buildings, it is going to be install a big rack where we can place all switches, routers and network equipment to make it comfortable working with the network devices. A good practice is to label every cable and interface in a way that it will be possible to understand all the network connections. 4. You should recommend ways to assure that you are not getting attacked. There are a lot of security measures that are design for the network, these measures are: -Port scanner: The network administrator of the company needs to be constantly monitoring the access layer doing port scanners over all the access switches of the network. This is necessary because just with only one access port without security could affect the whole network and it leaves the network expose against hackers without good intentions. -Firewalls: The firewalls are great network devices that bring high protection levels to the network. The firewalls are known by leaving the unknown and dangerous things outside the network, while keeping the important information inside the network for a better security level. The following security measures are implemented on the firewalls of the network - Packet filtering: The packet filtering gateways, is a secure implementation for the network, because what it does is to check the source and destination IP address for each packet, and examining the type of transport protocol that the streaming is using. The packets that are not listed on the policies configured by the network administrator of the enterprise are discarded for security measures. -Stateful inspection firewalls: The stateful inspection firewall instead of blocking any access, just like the packet filtering gateway does, it tracks the streaming of data to check any anomaly or threat in the network. If the proxy server accumulates enough evidence (set by the network administrator as a security policy) the host will be blocked. -Proxy server: The proxy server works as an intermediate between the communications of applications inside the network. The proxy server has a kind of pseudo applications that track the packets content traveling between the applications inside the network edge. -Encryption: The data encryption inside the network is one of the better options to keep the data and information completely secure. Without encryption, it would be easy for hackers to get the sensitive and important information that the network has. Or maybe also a man in the middle attack that tries to spy on the network. The principle task of encryption is to keep the information secure from the eyes of hackers and attackers. One of the most deployed algorithms nowadays is called RSA, which is an asymmetric algorithm that works along with two keys created inside the network, one is the public key and the other is the private key. Just like the names, the private key is created by the one that starts the communication and is kept, the private keys isn’t share with anyone while the public key is sent to the other side of the communication for example, if the key is create in Atlanta, then Atlanta sends the public key to Cincinnati while keeping the private key inside. Both keys are mathematically related, but they are not the same. -GRE (Generic Routing Encapsulation) over IPsec: One of the best methods to secure the communication between both locations is implementing a VPN (Virtual Private Network) over the ISPs (Internet Service Provider). IPsec brings a lot of security over the VPN, the only problem that IPsec has, is that it only allows the unicast packets transmission which will not allow dynamic routing protocols like OSPF or EIGRP, that’s why GRE comes along, because GRE does allow other kinds of communications like multicast and broadcast, so in order to have full connectivity between Atlanta and Cincinnati, GRE over IPsec is implemented. -IPsec security measures: IPsec is able to provide a lot of security measures like -Confidentiality: which is the encryption of packets over the internet and they are seen for outside users as cipher text, which has no meaning at all once the packet is open, they will see a lot of characters which is the encryption that IPsec is able to provide. -Integrity: Data integrity assures that the data hasn’t been modify for a third party between the communication of Atlanta and Cincinnati. -Authentication: Is the ability to stablish the connection only between both locations, by the applications of passwords which will deny the access of unauthorized users. Note: The two major security measures provided by IPsec are, confidentiality and Integrity. -NAT/PAT: NAT stands for Network Address Translation, and PAT (Port Address Translation) what NAT/PAT does is to translate private IP addresses to public IP addresses. The translations are made for the source IP address to the destination IP address and the Source TCP/UDP port to the destination TCP/UDP port. NAT/PAT was developed because of the need to save the IPv4 IP addresses. Although when the IPv4 protocol first started, it was believed that the IPv4 scope never would end but with the fast technology growth in these days, the amount of users connected to the internet, whether with laptops, workstations, cellphones and the vast amount of devices have limited the IPv4 addresses available over the world. So, the creation of NAT/PAT is able to provide one IP address for a big number of users, instead of one public IPv4 address per user, NAT/PAT is able to translate the private IP addresses per one public IP address, the addresses are translate per number of ports in order to differentiate the different streaming between both locations. -NAT/PAT security overview: This protocol brings a lot of security to the network because instead of expose private IP addresses of the network, which can be used to reveal the IP addresses of important servers where the data is kept, there is only one or a small group of addresses that are translated, going outside of the network. So, it helps to protect the real IP addresses of the networks. 5- You should build traps to stop attackers. -Honeynet: The honeynet works as a trap for hackers because the hackers can see the honeynets only as a host but it is actually a server. Honeynets are design to deny access to legitimate users inside the network, so if one outside user access the honeynet, it is supposed to be a hacker, so honeynets are good to improve the security inside both networks. 6- You should recommend any technology needed in the data center for high availability. The network is designed for each datacenter at Atlanta and Cincinnati to have redundancy, these locations have redundancy with switches, in case that any switch goes down there will be another switch to take over. Also, even though if the main database located at Atlanta goes down, there will be a back-up database located at Cincinnati. For a higher redundancy and security measures, the data is saved at the cloud, meaning that any of the main data storage enterprises, like google, will save the information In case it is a cyber-attack at both locations, there will be still a security back-up with a trustworthy service. 7- You should recommend any WAN or wireless technologies. -WAN (Wide Area Network): The WAN (Wide Area Network) between both locations Atlanta and Cincinnati is carry out with a layer two protocol (Frame Relay). Where each site is connected via ISPs (Internet Service Providers). The topology between both sites is a point-to-point network where the Atlanta location is directly connected with Cincinnati. With frame-relay, pointto-point interfaces, there is only one physical interface directly connected to the ISP at both locations. Frame relay is a packet switching WAN protocol that is frequently changing the path it takes to its destination because it works inside the networks of the internet, also for this reason frame relay is a lot cheaper than leased lines (dedicated lines between two sites), and this is one of the reason of the implementation instead of the leased lines. -Wireless technology: The wireless technology that the Cisco AP (Access Point) works with is IEEE 802.11 specially designed for Wi-Fi. This technology is implemented at both sites to allow connectivity to devices like laptops, tablets, and phones. The WIFI wireless connection runs the 802.11 standard established by the IEEE (Institute of Electrical and Electronics Engineers). These Access Points can work on both the global 2.4GHz and 5GHz radio bands. The following technologies work with 2.4 GHz band: 802.11b, 802.11g and 802.11n. This band can be affected by Bluetooth devices, microwave oven, and some wireless phones.