9
Bc. nprap. Petr Gryc University of Defence Brno, Czech republic

Configuration and recommended settings of border router in relation to network security

  • Upload
    tale

  • View
    25

  • Download
    0

Embed Size (px)

DESCRIPTION

Configuration and recommended settings of border router in relation to network security. Bc. n prap. Petr Gryc University of Defence Brno , Czech republic. Content. Motivation Subject of my student ’s project Current state Quick review of main applied principles - PowerPoint PPT Presentation

Citation preview

Page 1: Configuration  and recommended settings of border router in relation to network  security

Bc. nprap. Petr Gryc

University of Defence

Brno, Czech republic

Page 2: Configuration  and recommended settings of border router in relation to network  security

Motivation

Subject of my student’s project

Current state

Quick review of main applied principles

Complications and future plans

Page 3: Configuration  and recommended settings of border router in relation to network  security

Creation of new formation and independent units in Czech Army

Implementing VoIP in some dislocations

An Example of current real topology settings

Page 4: Configuration  and recommended settings of border router in relation to network  security

Border routers, as a interface between trusted and untrusted networks

Concept of DMZ, servers with internal and external access

Page 5: Configuration  and recommended settings of border router in relation to network  security

Working router settings containing Packet filteringRouter and router services settings NAT-TQoS

List of rules and recommended settings according to nsa.gov and cisco.com

School laboratory operating

Page 6: Configuration  and recommended settings of border router in relation to network  security

Restriction of unneeded router services and blocking unnecessary functions

Basic static routing with „rough“ security implementation used together with exact access rules to servers for convenience of firewall settings

Secured remote access and QoS

Page 7: Configuration  and recommended settings of border router in relation to network  security

Cisco and Alcatel network technology, both of them with proprietary VoIP technology and end use devices

Continuous changing and development of Czech Army IS various types and length of messages some of them are certified as Secret

Page 8: Configuration  and recommended settings of border router in relation to network  security

Implementation VoIP security and interconnection to existing VoIP network through real Army servers

Compare settings with real border router of detached military unit

Applied better rules based on packet load of Czech Army IS

Page 9: Configuration  and recommended settings of border router in relation to network  security

Summary:Subject of my student’s project, motivationCurrent state and main principlesFuture plans and complications

Contact:[email protected]

Thanks for your attention