When I went to Sally’s house, I found her ___ (fix) her bicycle. fixing
Joe and Sally’s Toys
description
Transcript of Joe and Sally’s Toys
Joe and Sally’s ToysJoe and Sally’s Toys
Joe and Sally’s Toys is a privately held Joe and Sally’s Toys is a privately held company, was started in 1999 in Dallas, company, was started in 1999 in Dallas,
Tx. The company designs and Tx. The company designs and manufactures award-winning kids toy manufactures award-winning kids toy systems which combines technology systems which combines technology
with aluminum and plastic construction. with aluminum and plastic construction. The goal of the company is to deliver a The goal of the company is to deliver a
high quality play experience that high quality play experience that families will play with for generations. families will play with for generations.
This company has called on our team to design and This company has called on our team to design and implement a network that would do the following:implement a network that would do the following:
Increase the overall security posture of the Increase the overall security posture of the networknetwork
Functionality without affecting overall network Functionality without affecting overall network
performanceperformance
QoS = SecurityQoS = Security
Pix Router configurationPix Router configuration
INTERNET
WEB SERVEREMAIL
DATA USER
ACCOUNTING
ENGINEERING
PIX ROUTER
ROUTER
SWITCH
CISCO IOS ROUTER HARDWARE-BASED FIREWALL CISCO IOS ROUTER HARDWARE-BASED FIREWALL WITH NATWITH NAT
INTERNET
ROUTER
SWITCH
DATA USER
TEST LAB
Router Configuration-Two Interface router-NAT or PAT Configuration-Extended Access List-DNS, SMTP Web services provided remotely or from ISP
“Definition- An application or device that selectively discriminates against network traffic flowing into or out of an organization network.”
What makes this a firewall
*What makes this router a fire-wall? “Answer” Content Based Control List
CBAC Key Features
-Protocols traffic Inspection-Session traffic Inspection-Inspects traffic up to the application layer-Keeps a state of the connection in memory-Session timers
INTERNET
ROUTER
SWITCH
DATA USER
TEST LAB
West Network ConfigurationWest Network ConfigurationCheck Point Endpoint Security uses a Stateful Check Point Endpoint Security uses a Stateful packet inspection for all traffic on our packet inspection for all traffic on our network.network.The centrally managed interface on the The centrally managed interface on the server allows the members of IT to update server allows the members of IT to update the malware definitions and the OS updates, the malware definitions and the OS updates, setup the VPN access, Encrypt disk contents setup the VPN access, Encrypt disk contents and monitor the firewall logs.and monitor the firewall logs.The Endpoint security is in all in one product The Endpoint security is in all in one product that allows us to protect all our resources and that allows us to protect all our resources and provide one mode of access, meaning just a provide one mode of access, meaning just a username and password is needed to access username and password is needed to access all user functions as opposed to multiple all user functions as opposed to multiple logins for a system with multiple security logins for a system with multiple security programs.programs.Webcheck allows questionable websites to be Webcheck allows questionable websites to be displayed for what they are because a displayed for what they are because a window will popup identifying them, so the window will popup identifying them, so the user can exit the site.user can exit the site.Program Control has Program advisor which Program Control has Program advisor which has a database of millions of legitimate has a database of millions of legitimate programs and malicious ones too, to give IT programs and malicious ones too, to give IT more control over what programs are allowed more control over what programs are allowed on the client systems.on the client systems.All of the Security is transparent to our users.All of the Security is transparent to our users.Checkpoint offers 24/7 support of the product Checkpoint offers 24/7 support of the product with locations around the Globe.with locations around the Globe.
INTERNET
HRIT
ROUTER
SWITCH
CHECKPOINT FIREWALL