8
Joe and Sally’s Toys Joe and Sally’s Toys Joe and Sally’s Toys is a Joe and Sally’s Toys is a privately held company, was privately held company, was started in 1999 in Dallas, Tx. The started in 1999 in Dallas, Tx. The company designs and manufactures company designs and manufactures award-winning kids toy systems award-winning kids toy systems which combines technology with which combines technology with aluminum and plastic construction. aluminum and plastic construction. The goal of the company is to The goal of the company is to deliver a high quality play deliver a high quality play experience that families will play experience that families will play with for generations. with for generations.

Joe and Sally’s Toys

  • Upload
    dolph

  • View
    27

  • Download
    0

Embed Size (px)

DESCRIPTION

Joe and Sally’s Toys. - PowerPoint PPT Presentation

Citation preview

Joe and Sally’s ToysJoe and Sally’s Toys

Joe and Sally’s Toys is a privately held Joe and Sally’s Toys is a privately held company, was started in 1999 in Dallas, company, was started in 1999 in Dallas,

Tx. The company designs and Tx. The company designs and manufactures award-winning kids toy manufactures award-winning kids toy systems which combines technology systems which combines technology

with aluminum and plastic construction. with aluminum and plastic construction. The goal of the company is to deliver a The goal of the company is to deliver a

high quality play experience that high quality play experience that families will play with for generations. families will play with for generations.

This company has called on our team to design and This company has called on our team to design and implement a network that would do the following:implement a network that would do the following:

Increase the overall security posture of the Increase the overall security posture of the networknetwork

Functionality without affecting overall network Functionality without affecting overall network

performanceperformance

QoS = SecurityQoS = Security

Pix Router configurationPix Router configuration

INTERNET

WEB SERVEREMAIL

DATA USER

ACCOUNTING

ENGINEERING

PIX ROUTER

ROUTER

SWITCH

CISCO IOS ROUTER HARDWARE-BASED FIREWALL CISCO IOS ROUTER HARDWARE-BASED FIREWALL WITH NATWITH NAT

INTERNET

ROUTER

SWITCH

DATA USER

TEST LAB

Router Configuration-Two Interface router-NAT or PAT Configuration-Extended Access List-DNS, SMTP Web services provided remotely or from ISP

“Definition- An application or device that selectively discriminates against network traffic flowing into or out of an organization network.”

What makes this a firewall

*What makes this router a fire-wall? “Answer” Content Based Control List

CBAC Key Features

-Protocols traffic Inspection-Session traffic Inspection-Inspects traffic up to the application layer-Keeps a state of the connection in memory-Session timers

INTERNET

ROUTER

SWITCH

DATA USER

TEST LAB

Check Point End point SecurityCheck Point End point Security

West Network ConfigurationWest Network ConfigurationCheck Point Endpoint Security uses a Stateful Check Point Endpoint Security uses a Stateful packet inspection for all traffic on our packet inspection for all traffic on our network.network.The centrally managed interface on the The centrally managed interface on the server allows the members of IT to update server allows the members of IT to update the malware definitions and the OS updates, the malware definitions and the OS updates, setup the VPN access, Encrypt disk contents setup the VPN access, Encrypt disk contents and monitor the firewall logs.and monitor the firewall logs.The Endpoint security is in all in one product The Endpoint security is in all in one product that allows us to protect all our resources and that allows us to protect all our resources and provide one mode of access, meaning just a provide one mode of access, meaning just a username and password is needed to access username and password is needed to access all user functions as opposed to multiple all user functions as opposed to multiple logins for a system with multiple security logins for a system with multiple security programs.programs.Webcheck allows questionable websites to be Webcheck allows questionable websites to be displayed for what they are because a displayed for what they are because a window will popup identifying them, so the window will popup identifying them, so the user can exit the site.user can exit the site.Program Control has Program advisor which Program Control has Program advisor which has a database of millions of legitimate has a database of millions of legitimate programs and malicious ones too, to give IT programs and malicious ones too, to give IT more control over what programs are allowed more control over what programs are allowed on the client systems.on the client systems.All of the Security is transparent to our users.All of the Security is transparent to our users.Checkpoint offers 24/7 support of the product Checkpoint offers 24/7 support of the product with locations around the Globe.with locations around the Globe.

INTERNET

HRIT

ROUTER

SWITCH

CHECKPOINT FIREWALL

ACCOUNTING

ENGINEERING

PIX

ROUTER

SWITCH

HRIT

ROUTER

SWITCH

CHECKPOINT FIREWALL

INTERNET

ROUTER

DATA USER

TEST LAB

Tom & Sally’s Toys Network