Library items tagged: technical guide

Anonymous
Overview Cisco offers the PIX firewall solution, acquired from Network Translation in 1995, along with the original Centri firewall which ran on the Windows NT® operating system. The Cisco PIX, however, runs its own proprietary system called PIX OS, currently at version 7. The PIX is a packet filtering firewall with stateful inspection, and there are several DPI features in the newer versions which enhance the rules that can be created.
Anonymous
SmoothWall and IPCop For some time, projects have been running to establish dedicated appliances based upon Linux, such as firewalls and web caches. These projects provide a pre-configured tool specific to one task which is easy to implement and configure.
Anonymous
Matthew Cook, Loughborough University Authors and Contributors This document was put together by Loughborough University to share knowledge, experience and current trends surrounding firewall implementation with the JANET community. This Technical Guide is complemented by the JANET Training programme which provides courses covering multiple facets of firewall implementation as part of their extensive portfolio.
Anonymous
Universities or colleges consisting of multiple campuses, each with a LAN, traditionally connect geographically diverse ‘islands’ by means of private leased lines. If the connected site is small and consumes little bandwidth, the costs of such WAN links do not necessarily represent value for money. Many organisations also wish to offer their staff the facility to connect to their central network remotely, either from their houses or when travelling on business.
Anonymous
The following sections describe various examples of guest facilities provided by Janet-connected organisations. The organisations, and their requirements to support guests, vary widely, so it is not surprising that the solutions are very different. Most use a combination of the tools described in the previous section – a table showing the main tools used in each case study is in section 4.8 – and all are based on a careful and continuing analysis of the organisation’s requirements and the risks they must address.
Anonymous
As stated, the following sections describe a number of tools and techniques that can be used to reduce the risk of misuse of the network. They are presented here in the context of providing network access for guests, though many of them can also be used for local users. None of the tools can make misuse impossible: each section describes which risks can be reduced by a particular tool and which risks may remain or be increased.
Anonymous
Organisations that connect to Janet agree to abide by the Terms for the Provision of the Janet Service, including complying with the Janet Connection, Security and Acceptable Use Policies.2 These Policies exist to support the use of Janet for its intended purpose as the UK’s education and research network. The Connection Policy ensures that organisations are only connected to the network where this will benefit that purpose.
Anonymous
The purposes of an educational organisation may often require it to receive guests from other organisations, both from within the education community and outside. Researchers, teachers, students and conference delegates may all come to the organisation from elsewhere and wish, or need, to use the host organisation’s network facilities. Where guests come to the host organisation for purposes connected with its publicly funded or educational remit, Janet Policies allow the host organisation to provide them with access to Janet should it choose to do so.
Anonymous
Wireless LAN Basics 1. Cisco® paper on allocating channels without overlaps: http://www.cisco.com/en/US/products/hw/wireless/ps430/ 2. Intel table of attenuation effects of different materials: http://www.intel.com/business/bss/infrastructure/wireless/deployment/considerations.htm
Anonymous
Surveying should be used at three different stages in the deployment of a wireless network.