Professional Documents
Culture Documents
Section 7.0
Network Security
management
Private Public
Address Address
10.0.1.2 128.143.71.21
NAT solution:
• Corporate network is managed with a private address space
NAT solution:
• Assign
g pprivate addresses to the hosts of the corporate
p
network
P i t
Private P bli
Public
Address Address
10.0.1.2/2001 128.143.71.21/2100
10.0.1.3/3020 128.143.71.21/4444
Private network
Sou
D e s rc e
tin a =1
tio n 2
10.0.1.2 = 1 8 .1 9 5 . Source = 128.195.4.120
0 .0 . 4
S1 1 .2 .1 2 0 Destination = 128
128.143.71.21
143 71 21
S2 .1 20
5 .4
2 8 .1 9
= 1 .0 . 1 . 4
10.0.1.4 0
rc e =1
n
S o u t i n a t io
D es Inside network Outside network
Private Public Public
Address Address Address
S3
10.0.1.2 128.143.71.21 128.195.4.120
10.0.1.4 128.143.71.21 213.168.12.3
Fragmentation
End-to-end connectivity:
First example:
iptables –t nat –A POSTROUTING –s 10.0.1.2
–j
j SNAT --to-source
to source 128
128.143.71.21
143 71 21
Pooling of IP addresses:
iptables –t nat –A POSTROUTING –s 10.0.1.0/24
j SNAT --to-source 128.128.71.0–
–j
128.143.71.30
IP masquerading:
p
iptables –t nat –A POSTROUTING –s 10.0.1.0/24
–o eth1 –j MASQUERADE
Load balancing:
p
iptables -t nat -A PREROUTING -i eth1 -j
j DNAT -
-to-destination 10.0.1.2-10.0.1.4
Virtual Groups
- VLAN membership
Broadcast
B d t firewall:
fi ll RRouters,
t VLAN
• Cost
Solution:
• Segment the network into distinct broadcast groups by
VLAN
B
Bestt method
th d ffor communicating
i ti VLAN membership
b hi
information across multiple switches?
C
Creating
ea g a and
dddifferentiating
e e a g workgroups
o g oups
Configuration automation
Thi
This tagging
t i allows
ll many VLAN
VLANs tto b
be carried
i d across a
common backbone, or trunk.
Two mechanisms
• frame filtering
• frame tagging
• That trunk
tr nk can ssupport
pport multiple
m ltiple VLANs
Source 1
Destination
Source 2
A 2
1
More complicated
p to p
provision a Layer
y 2 VPN
Embrace
E b and
d employ
l ththe 802
802.11i
11i IEEE security
it standard
t d d
DSL technologies
g use sophisticated
p modulation schemes to p pack data
onto copper wires. They are sometimes referred to as last-mile
technologies because they are used only for connections from a
telephone switching station to a home or office, not between switching
stations.
xDSL offers much higher speeds for upstream traffic, and downstream
traffic and these streams can be either symmetric or asymmetric.
© 2008, University of Colombo School of Computing 53
xDSL
Bandwidth
Frequency