SlideShare a Scribd company logo
3
Most read
5
Most read
6
Most read
Introduction to
network devices II.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– Security devices.
– Optimization and performance devices.
Page 4
Introduction to network devices II.
Page 5
Introduction to network devices II.
– Firewall.
» A firewall can be placed on routers or hosts (software
based) or can be its own device.
» It functions at multiple layers of the OSI model.
• Specifically at layers 2, 3, 4, and 7.
» It blocks packets from entering or leaving the network.
• Via stateless inspection: the firewall will examine
every packet against a set of rules. Once the packet
matches a rule, the rule is enforced, and the specified
action is taken.
• Via stateful inspection: the firewall will only examine
the state of the connection between networks.
Specifically, when a connection is made from an
internal network to an external network, the firewall will
not examine any packets returning from the external
connection. As a general rule, external connections are
not allowed to be initiated with the internal network.
» It is the first line of defense in protecting the internal
network from outside threats.
• Consider it the police force of the network.
Page 6
Introduction to network devices II.
– Intrusion detection system (IDS).
» An IDS is a passive system designed to identify when a
network breach or attack against the network is occurring.
• Usually designed to inform a network administrator when a
breach or attack has occurred through log files, SMS, and/or
an email notification.
» An IDS cannot prevent or stop a breach or attack on its own.
» It receives a copy of all traffic and evaluates it against a set of
standards.
• Signature based: evaluates network traffic for known
malware or attack signatures.
• Anomaly based: evaluates network traffic for suspicious
changes.
• Policy based: evaluates network traffic against a specific
declared security policy.
» May be deployed at the host level.
• Host-based intrusion detection system (HIDS).
Page 7
Introduction to network devices II.
– Intrusion prevention system (IPS).
» An IPS is an active system designed stop a breach or attack
from succeeding in damaging the network.
• Usually designed to perform an action or set of actions to stop
the malicious activity.
• Will inform a network administrator through the use of log
files, SMS, and/or email notification.
» All traffic on the network segment flows through the IPS to
either enter or leave the segment.
• Like the IDS, all traffic is evaluated against a set of standards.
» The best placement on the network is between a router (with a
firewall) and the destination network segment.
» It is programmed to make an active response to the situation.
• Block the offending IP address.
• Close down the vulnerable interface.
• Terminate the network session.
• Redirect the attack.
• Plus more.
Page 8
A virtual private network
(VPN) concentrator will allow
for many more secure VPN
connections to a network.
The concentrator will provide proper tunneling and
encryption, depending on the type of VPN connection that is
allowed. Most concentrators can function at multiple layers
of the OSI model (specifically Layer 2, Layer 3, and Layer
7). Outside of Internet transactions (which use SSL VPN
connections at Layer 7) most concentrators will function at
the network layer (Layer 3) of the OSI model, providing
IPsec encryption through a secure tunnel.
Introduction to network devices II.
Page 9
Introduction to network devices II.
Page 10
Introduction to network devices II.
– Load balancer.
» A load balancer may also be called a content switch or
content filter.
» A network appliance that is used to load balance
between multiple hosts that contain the same data—
spreading out the workload for greater efficiency.
• Commonly used to distribute the requests (workload) to
a server farm among the various servers, helping to
ensure that no single server gets overloaded.
– Proxy server.
» A proxy server is an appliance that requests resources
on behalf of client machines.
» It is often used to retrieve resources from outside
untrusted networks on behalf of the requesting client.
» It hides and protects the requesting client.
» It can also be utilized to filter allowed content.
» It can increase network performance by caching
commonly requested Web pages.
Page 11
Introduction to network devices II.
Firewalls are the police force of the network. The either allow or deny
network traffic based on a set of predefined rules. They may be an
appliance or software based. An IDS will inform a network administrator
when malicious actions have occurred (they are passive). An IPS is placed
inline with network traffic and will take action when malicious activities are
detected.
Topic
Security devices.
Summary
A load balancer (also known as a content switch or content filter) is a
network appliance that will balance requests across multiple devices that
contain the same data. A proxy server acts on behalf of a client device to
fulfill requests to retrieve data. It can also be used to limit what requests are
fulfilled.
Optimization and
performance devices.
Page 12
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT: Introducing_NAT - N10 006
PPTX
PACE-IT: Network Infrastructure Implementations - N10 006
PPTX
PACE-IT: Intro to the DNS Service - N10 006
PPTX
PACE-IT: Networking Services and Applications (part 2) - N10 006
PPTX
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PPTX
PACE-IT: Implementing a Basic Network - N10 006
PPTX
PACE-IT: Special IP Networking Concepts - N10 006
PPTX
PACE-IT: Introduction to IPv4 (part 1) - N10 006
PACE-IT: Introducing_NAT - N10 006
PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Intro to the DNS Service - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Special IP Networking Concepts - N10 006
PACE-IT: Introduction to IPv4 (part 1) - N10 006

What's hot (20)

PPTX
PACE-IT: Storage Area Networks - N10 006
PPTX
PACE-IT: Networking Services and Applications (part 1) - N10 006
PPTX
PACE-IT: DHCP in the Network - N10 006
PPTX
PACE-IT: Network Cabling (part 1) - N10 006
PPTX
PACE-IT: Introduction to IPv6 - N10 006
PPTX
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PPTX
PACE-IT: Introduction to IPv4 (part 2) - N10 006
PPTX
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PPTX
PACE-IT: Introduction to Wireless Standards
PPTX
Pace IT - Tools for Working on Networks
PPTX
PACE-IT: Network Cabling (part 2) - N10 006
PPTX
Pace IT - Types of Networks
PPTX
Pace IT - Alternative Internet Connections (part 2)
PPTX
PACE-IT: Virtualization Technology - N10 006
PPTX
Pace IT - Introduction to IPv6
PPTX
PACE-IT: Network Cabling (part 3) - N10 006
PPTX
Pace IT - Common Ports and Protocols
PPTX
PACE-IT: Basic Elements of Unified Communications - N10 006
PPTX
PACE-IT: Introduction to Routing Protocols - N10 006
PPTX
PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Storage Area Networks - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: DHCP in the Network - N10 006
PACE-IT: Network Cabling (part 1) - N10 006
PACE-IT: Introduction to IPv6 - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction to Wireless Standards
Pace IT - Tools for Working on Networks
PACE-IT: Network Cabling (part 2) - N10 006
Pace IT - Types of Networks
Pace IT - Alternative Internet Connections (part 2)
PACE-IT: Virtualization Technology - N10 006
Pace IT - Introduction to IPv6
PACE-IT: Network Cabling (part 3) - N10 006
Pace IT - Common Ports and Protocols
PACE-IT: Basic Elements of Unified Communications - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Network Monitoring (part 1) - N10 006
Ad

Similar to PACE-IT: Introduction_to Network Devices (part 2) - N10 006 (20)

PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
PPTX
Pace IT - Network Devices (part 2)
PPTX
Securing E-commerce networks in MIS and E-Commerce
PDF
004_Cybersecurity Fundamentals Network Security.pdf
PPT
Intrusion Detection System
DOC
06686259 20140405 205404
PPSX
Ids 001 ids vs ips
PDF
Introduction to Cyber security module - III
PPTX
A Deep Dive in the World of IT Networking (Part 2)
PPTX
Intrusion Detection and Prevention Systems.pptx
PPTX
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PPT
Intrusion detection and prevention
PPT
Intrusion Detection And Prevention
PPTX
PACE-IT: Physical Network Security Control
PPTX
PACE-IT: Network Monitoring (part 2) - N10 006
PPSX
Network & security startup
PPTX
PPTX
Lesson-24-Network-Secuirty-Infrastructure.pptx
PPTX
Cours_4_IDS_IPS.pptx
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 1)
Pace IT - Network Devices (part 2)
Securing E-commerce networks in MIS and E-Commerce
004_Cybersecurity Fundamentals Network Security.pdf
Intrusion Detection System
06686259 20140405 205404
Ids 001 ids vs ips
Introduction to Cyber security module - III
A Deep Dive in the World of IT Networking (Part 2)
Intrusion Detection and Prevention Systems.pptx
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
Intrusion detection and prevention
Intrusion Detection And Prevention
PACE-IT: Physical Network Security Control
PACE-IT: Network Monitoring (part 2) - N10 006
Network & security startup
Lesson-24-Network-Secuirty-Infrastructure.pptx
Cours_4_IDS_IPS.pptx
Ad

More from Pace IT at Edmonds Community College (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)

Recently uploaded (20)

PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
RMMM.pdf make it easy to upload and study
PDF
Trump Administration's workforce development strategy
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
Cell Types and Its function , kingdom of life
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
advance database management system book.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PPTX
Final Presentation General Medicine 03-08-2024.pptx
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Supply Chain Operations Speaking Notes -ICLT Program
RMMM.pdf make it easy to upload and study
Trump Administration's workforce development strategy
Paper A Mock Exam 9_ Attempt review.pdf.
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Orientation - ARALprogram of Deped to the Parents.pptx
A systematic review of self-coping strategies used by university students to ...
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Hazard Identification & Risk Assessment .pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Cell Types and Its function , kingdom of life
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
advance database management system book.pdf
History, Philosophy and sociology of education (1).pptx
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Final Presentation General Medicine 03-08-2024.pptx

PACE-IT: Introduction_to Network Devices (part 2) - N10 006

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE-IT. – Security devices. – Optimization and performance devices.
  • 4. Page 4 Introduction to network devices II.
  • 5. Page 5 Introduction to network devices II. – Firewall. » A firewall can be placed on routers or hosts (software based) or can be its own device. » It functions at multiple layers of the OSI model. • Specifically at layers 2, 3, 4, and 7. » It blocks packets from entering or leaving the network. • Via stateless inspection: the firewall will examine every packet against a set of rules. Once the packet matches a rule, the rule is enforced, and the specified action is taken. • Via stateful inspection: the firewall will only examine the state of the connection between networks. Specifically, when a connection is made from an internal network to an external network, the firewall will not examine any packets returning from the external connection. As a general rule, external connections are not allowed to be initiated with the internal network. » It is the first line of defense in protecting the internal network from outside threats. • Consider it the police force of the network.
  • 6. Page 6 Introduction to network devices II. – Intrusion detection system (IDS). » An IDS is a passive system designed to identify when a network breach or attack against the network is occurring. • Usually designed to inform a network administrator when a breach or attack has occurred through log files, SMS, and/or an email notification. » An IDS cannot prevent or stop a breach or attack on its own. » It receives a copy of all traffic and evaluates it against a set of standards. • Signature based: evaluates network traffic for known malware or attack signatures. • Anomaly based: evaluates network traffic for suspicious changes. • Policy based: evaluates network traffic against a specific declared security policy. » May be deployed at the host level. • Host-based intrusion detection system (HIDS).
  • 7. Page 7 Introduction to network devices II. – Intrusion prevention system (IPS). » An IPS is an active system designed stop a breach or attack from succeeding in damaging the network. • Usually designed to perform an action or set of actions to stop the malicious activity. • Will inform a network administrator through the use of log files, SMS, and/or email notification. » All traffic on the network segment flows through the IPS to either enter or leave the segment. • Like the IDS, all traffic is evaluated against a set of standards. » The best placement on the network is between a router (with a firewall) and the destination network segment. » It is programmed to make an active response to the situation. • Block the offending IP address. • Close down the vulnerable interface. • Terminate the network session. • Redirect the attack. • Plus more.
  • 8. Page 8 A virtual private network (VPN) concentrator will allow for many more secure VPN connections to a network. The concentrator will provide proper tunneling and encryption, depending on the type of VPN connection that is allowed. Most concentrators can function at multiple layers of the OSI model (specifically Layer 2, Layer 3, and Layer 7). Outside of Internet transactions (which use SSL VPN connections at Layer 7) most concentrators will function at the network layer (Layer 3) of the OSI model, providing IPsec encryption through a secure tunnel. Introduction to network devices II.
  • 9. Page 9 Introduction to network devices II.
  • 10. Page 10 Introduction to network devices II. – Load balancer. » A load balancer may also be called a content switch or content filter. » A network appliance that is used to load balance between multiple hosts that contain the same data— spreading out the workload for greater efficiency. • Commonly used to distribute the requests (workload) to a server farm among the various servers, helping to ensure that no single server gets overloaded. – Proxy server. » A proxy server is an appliance that requests resources on behalf of client machines. » It is often used to retrieve resources from outside untrusted networks on behalf of the requesting client. » It hides and protects the requesting client. » It can also be utilized to filter allowed content. » It can increase network performance by caching commonly requested Web pages.
  • 11. Page 11 Introduction to network devices II. Firewalls are the police force of the network. The either allow or deny network traffic based on a set of predefined rules. They may be an appliance or software based. An IDS will inform a network administrator when malicious actions have occurred (they are passive). An IPS is placed inline with network traffic and will take action when malicious activities are detected. Topic Security devices. Summary A load balancer (also known as a content switch or content filter) is a network appliance that will balance requests across multiple devices that contain the same data. A proxy server acts on behalf of a client device to fulfill requests to retrieve data. It can also be used to limit what requests are fulfilled. Optimization and performance devices.
  • 13. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.