Network Access Control And Network Systems Computer Science Essay

Published: November 9, 2015 Words: 3561

The main value of the proposal for a NAC is to prevent end-stations, the lack of anti-virus, patches, or host intrusion located in the access network and the cross infection risk and other protective computer worm computer.

Terms NAC solutions allow network operators to identify, such as computer or allow access to all network users and the role of key policy implementation, routers and network middleware them. Identity and access management. Traditional IP network IP address of the application of access policies that NAC environment to do so on the basis of trying to authenticate users, at least the client stations as laptop and desktop computer.

Consumers is a way to detect the user and verifies whether the user is allowed access to limited service, for example, the user must be identified as a student for his grades, the user must be identified as a member of Columbia public access to the Oxford English Dictionary for work online, the user must be defined as a network administrator to access documents, web administration in Colombia.

When you log into your computer network, you acknowledge that you have the right to use computer resources of Colombia, and furthermore, you are a user who has a set of these resources (files, email, etc.) proper identification of the user, and password.

For ColumbiaWeb, you will encounter several different methods of authentication. The two most common are: Htaccess files (used to restrict access on a secure server and Columbia) and wind (which is used for authenticating remote users of the applications of Colombia).

Two-factor authentication

Where items are two factors necessary for identification, then a two-factor authentication is used. . For example, a bank card (user available) and PIN (something the user knows). Business networks can require users to provide a password (knowledge factor) and random number token (Property Factor). Access to very high security system may require screening mantrap height, weight, face and fingerprint checks (several elements inherence factor) and PIN and one day, the code (coefficient of elements of knowledge), but it is not two factor authentication.

Virus Protection

The most important computer advised to "back up your files, which helps to protect your data if you ever get a virus: The second most important principle is" implementing a program for virus protection. If your antivirus program does not include a firewall, you need to buy it as well.

Modern computer viruses are more dangerous than ever. This is critical to the protection of all valuable information and programs on your computer that you run a good antivirus protection program. Most of these applications may periodically update its database over the internet threats such as development and automatically keep your virus protection up to date and your computer safe.

The list of antivirus protection programs and services

• Google - Anti-Virus

• Freebyte Guide Free Anti-Virus Software

• Yahoo - Virus Protection

• Trade. The following antivirus vendors for several years - check the latest revision.

• Avira.com

• BitDefender.com

• CentralCommand.com

• F-Prot Antivirus

• F-Secure Anti-Virus

• Kapersky Labs

• McAfee Associates »VirusScan

• NOD32 Ireland

• Panda Security

• Sophos Anti-Virus

• Symantec-Norton Anti-Virus

• TrendMicro.com

Anti-Virus • Dr. Solomon's Toolkit (DRSolomon.com)

Support

After installing antivirus protection on the following additional precautions

Never use diskettes, CD, DVD, tape or other foreign media, that is someone else's computer without scanning it with antivirus protection program to put all the default scan media. If you give the media someone else to copy the file to write protected first so that it is not accidental contamination.

Protect your perimeter. Make sure that the antivirus protection settings enabled by default search inbox and files downloaded off the Internet.

Infection Computers that run good antivirus protection is not normally infect. However, if you are sure your system is in any way a virus, however, may take the following steps:

Immediately turn off your computer and restart it is not infected disk, to prevent virus wreaking more damage.

Start your computer in some foreign media, such as clean boot floppy, CD, DVD, or external drive, which was previously scanning antivirus protection.

Run your antivirus software from a clean boot disk on an infected disk, and if necessary to fix or remove infected files and replace them on the infected disk.

If you need help, or your antivirus can not clear the disc, you best be advised to take your computer to a professional service, where have the means to try to clean and restore disk as best they can.

Remember that anti-virus protection sometimes cause false alarms in common cause when a program file has changed size, but reason. Another common indicator that can have a false alarm, if your antivirus defense claims that the file may contain a virus, but do not know the name of the virus. Do not delete files if virus protection, in particular, implies that knowing the name of the virus, but otherwise it seems reasonable proposal.

Firewall

A firewall is a computer system or network, and its purpose is to prevent unauthorized access, while allowed part of the message. This is a device or configured to enable or disable rules and other criteria for equipment of the transmission network based on the provisions.

Firewalls can be implemented in a computer or software or both. Firewalls are frequently used to prevent users from accessing private networks connected to the Internet network, in particular, unauthorized Internet users. All messages and go through the firewall, which inspects each message and stop those who do not meet safety standards set out in the intranet.

There are several types of firewall techniques.

1. Packet filtering: packet filtering examines each packet data over the network and accepts or rejects the basis of user-defined rules. Although it is difficult to regulate, it is quite effective, and its users are mostly transparent. It is vulnerable to IP played.

2. Application Gateway, the application of specific security mechanisms, such as FTP and TELNET servers. It is very effective, but can impose performance degradation.

3. Cable level gate pillars: security mechanisms when TCP or UDP connection is established. When the connection has been made, packets can flow between the hosts and the subsequent investigation.

4. Proxy server: block all messages entering and leaving the network. Proxy server effectively hides the true network addresses.

Internet

Is Microsoft-in. NET Framework provides Internet service, you can quickly and easily integrate into the application layer can expand and manage their implementation. Applications can be built in plug protocol for automatic recognition of the benefits of new Internet protocol, or they can use Windows interface contacts to work with the successful implementation of a network contact.

Pluggable protocol presented

Describes how to access regardless of access protocol, it requires a web resource.

Request information

Explains how to use the pluggable protocol to upload and download data, Internet resources.

Programming plug Protocol

Explanation of how to implement the protocol specific classes pluggable protocol.

Using the application protocol

Describes programming applications, such as TCP, UDP and HTTP network protocols advantage.

Configuring Internet Applications

Explains how to use. NET Framework configuration file to configure the Internet application.

Internet Security

Describes how to use standard Internet technologies for security and identification.

Best Practices for System.Net

Advice and the Internet to your application more effectively to cross the border?

System.Net Namespace

System.Net space provides a reference document. WebRequest and WebResponse classes in this space is used for pluggable protocols.

System.Net.Sockets Namespace

System.Net.Sockets provides space, it provides a managed implementation of Windows contacts document interface reference.

Task 2

Problems all the time available?

What is your user name and password correct? Make sure the user name and password if it matches.

The password is correct? Please check your password.

The account has been blocked by either the server? Please check whether the account exists.

Do you have a network adapter installed computer? Whether you are using an adapter card please check your computer.

I have installed the drivers for the network adapter is a computer? Check, please install the driver.

Is your computer connected to the Internet through the main server is illegal? Please check whether your computer is blocked.

Did someone change the password security? Check if true, write a new security key?

Before a problem occurs, the user did you install new applications? Check, please uninstall the real issue is whether to review the new application.

Is the network adapter is working? Please replace the adapter card so you can check.

The problem is the router, or network components such as occurs in the switch or hub? This problem, router, switch or hub, power them off if true, is the first power. If it does not work, please replace it.

You can add new devices to the network, network, or remove old equipment?

I turn on whether a cut? Check-in, if cut off, or turn it off to the server?

How old cable equipment? Please check if the old cable and cable, it still might not be good.

Network's domain name is correct? Re-enter the correct domain name, check whether the name is wrong.

Transformers, large motor, specify the location of cables or wires near the air conditioner.

Jack, patch panel, right? Check, please patchpanels true jack replaced.

Is the type and speed are set correctly? If so check and set the speed.

Loose connections or missing?

Task 3

There is no firewall in the network

Three type of Firewall product are:

Watchguard Firebox X5500e UTM

Cisco ASA 5520

Sonic Wall TZ 100 (01-SSC-8734)

Watchguard Firebox X5500e UTM

Manufacturer

Manufacturer part number- WG55503-T

Manufacturer- WatchGuard Technologies, Inc

Manufacturer Website Address-www.watchguard.com

Model

X5500e

Feature

Interfaces/Ports - 8 x RJ-45 10/100/1000Base-T LAN, 1 x Serial Management

Number of Ports - 8

Brand Name - WatchGuard Technologies, Inc

Product Line - Firebox

Product Type - VPN Appliance

Product Name - Firebox X5500e UTM Bundle VPN, Firewall

VPN Throughput - 400 Mbps

Firewall Throughput - 2Gbps

Green Compliance - Yes

Green Compliance Certificate/ Authority - WEEE

Form Factor - Rack - mountable

Dimension - 1.75" Height x 16.75" Width x 14.25" Depth

Weight (approximate) - 12.40 LB

Input Voltage Range - 100 V AC- 240 V AC

Input Voltage - 110 VAC

Power Source - Power Supply

Virtualization - 75

Firewall Production - Deep per Detection

Encryption Standard - DES

Standard Warranty - One year limited

Cisco ASA 5520

Manufacturer

Manufacturer part number - ASA5520-BUN-K9

Manufacturer - Cisco Systems

Model

ASA 5529

Feature

Interfaces/Ports - 1 x network - Ethernet 10 Base

Brand Name - Cisco Systems

Product Line - Security Appliance

Product Type - Firewall protection, VPN support, load balancing, VLAN support, High ability

Product Name - Cisco ASA 5520 Firewall Edition

VPN Throughput - 225 Mbps

Firewall Throughput - 450 Mbps

Compliance - Yes

Compliance Standard - CE, FCC Class A certified CISPR 22 Class A, EN 60950, EN 61000-3-2, UL 1950, VCCI Class A ITE, IEC 60950, EN 61000-3-3, CSA 22.2 No.950, EN55022 Class A, ACA TS001, AS/NZS 3260, FCCP

Form Factor - Rack - mountable

Dimension - 17.5 in x Width 13.2 in x Depth 1.7 in Height

Weight (approximate) - 20.1 Lbs.

Input Voltage - AC 120/230 V ( 50/60 Hz )

Power Source - Power Supplies (Internal)

Power Provided - 190 Watt

Encryption Standard - DES, Triple DES, AES

Expansion Connectivity - 1 (1) x expansion slot 1 memory

Data link protocol - Ethernet, Fast Ethernet, Gigabit Ethernet

Capacity - Concurrent sessions : 280000 IPSec VPN peers : 750 SSL VPN peers : 2

Sonic Wall TZ 100 (01-SSC-8734)

Manufacturer

Manufacturer part number - 01-SSC-8734 ( TZ 100 )

Manufacturer - Sonic Wall

Model

01-SSC-8734

Feature

Interfaces/Ports - 5 x network - Ethernet 10Base-T/100Base-TX - RJ-45

Brand Name - Sonic Wall

Product Line - Security Appliance

Product Type - Firewall protection, routing, DHCP support, NAT support, VPN support, PAT support, load balancing, Stateful Packet Inspection (SPI), DoS attack prevention, dynamic DNS server, antivirus analysis, Intrusion Prevention System (IPS), Deep Packet Inspection (DPI), DDos attack prevention, IPSec over WLAN, anti-spam protection, IPSec NAT-Traversal (NAT-T)

Product Name - SonicWall TZ 100 Hardware Only Firewall Appliance (01-SSC-8734)

Compliance - Yes

Compliance Standard - WEEE

Form Factor - External

Dimension - 9 in Width x 9.1 in Depth x 2.9 in Height

Weight (approximate) - 2 Lbs.

Input Voltage - AC 120/230 V ( 50/60 Hz )

Power Source - Power adapter (External)

Power Provided - 11.7 Watt

Data link protocol - Ethernet, Fast Ethernet

Capacity - Concurrent connections : 6000 ¦ Security policies : 250 ¦ VPN tunnels (site-to-site) : 5 ¦ VPN users : 5 ¦ Nodes : unlimited ¦ Authenticated users (internal database) : 25

Switching Protocol - Ethernet

Network/ Transport Protocol - L2TP, IPSec

Routing Protocol - RIP-1, RIP-2, static IP routing

Task 4

Accessing the WWW

To modify this for your organization, you should record:

* Please read carefully to make sure you agree. This policy is just an example, may not meet the requirements of your specific organization.

* The "gadget Limited" with your organization's name.

* If you have Internet access, your organization can not for the personal use of employees, due to bandwidth limitations, such as mailing lists or streaming media, providing additional on "what is not acceptable to use" The section on the specific application.

* The use of quantification can be considered unacceptable, the volume. Replace "will be greater than the amount of network bandwidth used is appropriate" if "is larger than 1MB in size."

* Consider whether 30 days notice (as provided in the model file), or some other period of notice of the need for change.

* If you do not insist on Internet use and monitoring records, delete the sentence otherwise provided for (in the "unacceptable use of consequences").

* If your organization has implemented or intend to implement filtering technology to restrict employee access to Internet, you may want to include a statement of the role of this document. Prior notice to employees can help determine if the client does not receive from the e-mail, or can not be disputed that contain non-material into the location, filtering technology is due to the common tendency to mistakenly block material and if so to help rectify the problem, especially when It is the use of work-related interference.

* If your organization does not have a separate privacy policy and seriously consider implementing one. This document is not a privacy policy.

* Remove the beginning of this document at the following line cutting, which is part of these notes and presentations.

Instant Messanger

All the above measures also apply to, and recommended the use of instant messaging. Some are listed below

• When you get along with any unknown and the design pattern name, then separate the answer to this news, because it may be a virus or a number of unverified information tracking organized.

• Avoid talking to the person who is talking to the new list.

• avoid using incorrect information there is a \ choose any new round of instant messenger information, you are using.

• Do not reply or courier at the source by the company to provide figures.

Chat Room

Chat rooms are an existing forum for students to exchange information.

Only those people posting privileges. Internet chat rooms can be a useful and interesting, but ill intent in the chat room user can damage the environment.

Acceptable use policy, also known as the use of policies designed to prevent damage to the user chat rooms.

Chat room where the site owner in the establishment of an acceptable use policy.

IM users responsible for the comments, they are in the chat rooms.

Usage Email Policy

E-mail is for company business. The company's confidential information shall not be shared outside the company, without authorization, at any time. You are not for commercial use the company's personal computer or e-mail. Internet use, hours of work in the company, the Company is authorized to conduct business only. Use of the Internet has brought the possibility of confidential information in violation of the security company. This program from the corporate network requires IT personnel to invest time and attention, is better committed to progress. For this reason, in order to ensure that the work of the working time used properly, we require staff to limit use of the Internet.

Send, or attempt to send spam to any network of service providers;

* Send, or attempt to send, from any third-party network to use a return email address web hosting service provider or e-mail address refers to a web hosting service provider category of spam;

* Send to result from the recipient or the recipient's e-mail providers, complaint, or the sender's e-mail address or mail server blacklist leading e-mail;

* Send This is excessive and / or intended to harass or annoy other people's e-mail;

* Continue to send e-mail to an already said that he / she does not want to receive the recipient; or

* Take any action intended to cloak Customer's identity or contact information, including but not limited to intentionally omit, delete, forge or distort the message headers or return addresses.

Service providers the right to suspend or terminate, the breach of this policy to notify the client to access e-mail service. Indirect or attempted violations of this policy, the actual or attempted violations by a third party on behalf of the customer, should consider the policy violation by the customer.

Task5

-----------Local Mode Diagnosis:Start - 2010/11/12(10hr:09min:57sec)-----------

Log Location: C:\Users\YE WiN AuNG\AppData\Roaming\IPSecureLogs\LocalMode2010-11-12(10hr-09min-57sec)

Local IP: 192.168.10.101, Remote Machine: 192.168.100.103

SystemInfo:

--Passed: System information(software, hardware,active processes, active network connections) collected. View Output Logs for details

Network Interface Diagnosis:

--Passed : Network Interface configured correctly

Ping (Remote Reachability) Diagnosis:

Passed: Remote machine,"192.168.100.103", is reachable from host

IPsec Service Diagnosis:

--Passed : IPsec services are up and running

----BFE up and running

----IKEext/Policyagent up and running

Live Debugging: Start

WFPUtil Diagnosis:

(If you did not repro the issue while the tool was running, ignore WFPUtil Diagnosis)

This Diagnosis report is for negotiation between host and WiN

Failed: No IKE negotiaton found between Host machine and WiN. This could be because:

--1.Wrong value was entered for the Desitnation IP Address(Client2 IP)

--2.Wrong log was provided

--3.IPSec is not monitoring traffic between Host machine and WiN

Live Debugging: End

IPsec SA, Filter Diagnosis:

--Failed : No policies on this system

Unable to open the parsed file:

--Make sure netshcure.exe is placed in the tool folder - C:\Program Files\Microsoft IPsec Diagnostic Tool

--Make sure you entered the correct IP

-----------Local Mode Diagnosis:End - 2010/11/12(10hr:09min:57sec)-----------

-----------Local Mode Diagnosis:Start - 2010/11/12(10hr:09min:57sec)-----------

Log Location: C:\Users\YE WiN AuNG\AppData\Roaming\IPSecureLogs\LocalMode2010-11-12(10hr-09min-57sec)

Local IP: 192.168.10.101, Remote Machine: 192.168.100.103

SystemInfo:

--Passed: System information(software, hardware,active processes, active network connections) collected. View Output Logs for details

Network Interface Diagnosis:

--Passed : Network Interface configured correctly

Ping (Remote Reachability) Diagnosis:

Passed: Remote machine,"192.168.100.103", is reachable from host

IPsec Service Diagnosis:

--Passed : IPsec services are up and running

----BFE up and running

----IKEext/Policyagent up and running

Live Debugging: Start

WFPUtil Diagnosis:

(If you did not repro the issue while the tool was running, ignore WFPUtil Diagnosis)

This Diagnosis report is for negotiation between host and WiN

Failed: No IKE negotiaton found between Host machine and WiN. This could be because:

--1.Wrong value was entered for the Desitnation IP Address(Client2 IP)

--2.Wrong log was provided

--3.IPSec is not monitoring traffic between Host machine and WiN

Live Debugging: End

IPsec SA, Filter Diagnosis:

--Failed : No policies on this system

Unable to open the parsed file:

--Make sure netshcure.exe is placed in the tool folder - C:\Program Files\Microsoft IPsec Diagnostic Tool

--Make sure you entered the correct IP

-----------Local Mode Diagnosis:End - 2010/11/12(10hr:09min:57sec)-----------

-----------Local Mode Diagnosis:Start - 2010/11/12(10hr:11min:41sec)-----------

Log Location: C:\Users\YE WiN AuNG\AppData\Roaming\IPSecureLogs\LocalMode2010-11-12(10hr-11min-41sec)

Local IP: 192.168.10.101, Remote Machine: 192.168.100.103

NAP Client Diagnosis:

--Information : NAP client service is installed but turned off. Run "net start napagent" to start the service

IPsec Service Diagnosis:

--Passed : IPsec services are up and running

----BFE up and running

----IKEext/Policyagent up and running

Live Debugging: Start

--Information: Enabling RRAS Trace

WFPUtil Diagnosis:

(If you did not repro the issue while the tool was running, ignore WFPUtil Diagnosis)

This Diagnosis report is for negotiation between host and WiN

Failed: No IKE negotiaton found between Host machine and WiN. This could be because:

--1.Wrong value was entered for the Desitnation IP Address(Client2 IP)

--2.Wrong log was provided

--3.IPSec is not monitoring traffic between Host machine and WiN

Live Debugging: End

RRAS Diagnosis:

--Passed : RRAS is switched off, implying no external policies

--Information: Disabling RRAS trace that was enabled during live debugging.RRAS logs copied.

Registry and Events Diagnosis:

--Passed: System, Application and Security event logs collected

Windows Firewall Diagnosis:

--Information : Windows Firewall is not running. Check if system has another firewall active.

IPsec SA, Filter Diagnosis:

--Failed : No policies on this system

Unable to open the parsed file:

--Make sure netshcure.exe is placed in the tool folder - C:\Program Files\Microsoft IPsec Diagnostic Tool

--Make sure you entered the correct IP

-----------Local Mode Diagnosis:End - 2010/11/12(10hr:11min:41sec)-----------

New