E N D
Joe and Sally’s Toys Joe and Sally’s Toys is a privately held company, was started in 1999 in Dallas, Tx. The company designs and manufactures award-winning kids toy systems which combines technology with aluminum and plastic construction. The goal of the company is to deliver a high quality play experience that families will play with for generations.
This company has called on our team to design and implement a network that would do the following: • Increase the overall security posture of the network • Functionality without affecting overall network performance • QoS = Security
CISCO IOS ROUTER HARDWARE-BASED FIREWALL WITH NAT Router Configuration -Two Interface router -NAT or PAT Configuration -Extended Access List -DNS, SMTP Web services provided remotely or from ISP
What makes this a firewall “Definition- An application or device that selectively discriminates against network traffic flowing into or out of an organization network.” *What makes this router a fire-wall? “Answer” Content Based Control List CBAC Key Features -Protocols traffic Inspection -Session traffic Inspection -Inspects traffic up to the application layer -Keeps a state of the connection in memory -Session timers
West Network Configuration • Check Point Endpoint Security uses a Stateful packet inspection for all traffic on our network. • The centrally managed interface on the server allows the members of IT to update the malware definitions and the OS updates, setup the VPN access, Encrypt disk contents and monitor the firewall logs. • The Endpoint security is in all in one product that allows us to protect all our resources and provide one mode of access, meaning just a username and password is needed to access all user functions as opposed to multiple logins for a system with multiple security programs. • Webcheck allows questionable websites to be displayed for what they are because a window will popup identifying them, so the user can exit the site. • Program Control has Program advisor which has a database of millions of legitimate programs and malicious ones too, to give IT more control over what programs are allowed on the client systems. • All of the Security is transparent to our users. • Checkpoint offers 24/7 support of the product with locations around the Globe.