COMPTIA Security+ Tutorial: Module 01,Part 07- Network Design Elements and Components

Network Design

In the wake of having a more critical look of the intermediaries, firewalls and subnetting, we will investigate the system plan. We will comprehend what are the essential necessities or the segments for the framework outlining.

The primary component we take a gander at is the Demilitarised Zone (DMZ). It is a zone where we permit just the trusted into the system without really giving them access to the inward system. These firewalls will keep the activity from general society to meddle with the interior system. This will help the clients to have the entrance to the server when on the web, however they won’t have entry to the inside system.

A few associations put their email into this DMZ where the representatives can have admittance to such servers. Another component we will take a gander at is remote get to. On occasion, a portion of the staff should telecommute or work from different associations to which we offer administration. Such individuals should associate remotely with the interior framework and this interface ought to be built up through a Virtual Private Network.

The Remote Access Servers would need an authentication before the connection is established through the internet. In order to protect the network from the malicious users, it is important that we have a verification before authorization.

Telephony

The transmission of data through the equipment in a telecommunication environment is called as telephony.

PBX

Telephoning is the framework that subtle elements on the association between the inward clients or clients outside the association utilizing the Private Branch Exchange servers (PBX). Not withstanding for the inward correspondence, the telephones ought to be secured by the codes, that is, the point at which any person wishes to talk they should dial up a code

VOIP

The Voice Over Internet Protocol, (VOIP) to reduce the telephone bills drastically. It is the method that uses the data encryption to maintain the confidentiality of the information shared.This will prevent the malicious persons to eavesdrop on our communication.

Network Access Control

One way to control access to our systems is to execute Network Access Control. It will check and confirm the condition of strength of the considerable number of machines being used. Every one of the machines that will look for access to the system should meet a standard measure and leave the wellbeing check behind the  server to meet the pattern. The procedure to check for the machines will be conveyed every time as the machines that are far from the system could have been tainted.

In case, some of the machines are infected, they need to be fixed. The network authentication will take place on the Domain Controller. Each system that wish to have an access to the network will have to pass through the health check server. If the machine passes the test, it will be redirected either to the Domain controller or to the remediation server.

The fundamental segments of the NAC items incorporate:

Access Requestor: It is the device that requests the access.

Policy Decision Point: The PDP decides what access should be assigned to the device.

Policy Enforcement Point: This is the gadget that authorizes a strategy, acting as a switch or firewall.

Presently, we will discuss Virtualization which is about making the virtual instead of a real form of the working framework or a server. It includes the segment of the Operating framework where every parcel is the coherent division of the hard plate drive to make two isolated hard drives.

Why do you think Virtualization evolve? When the users want the multiple operating system images to run at the same time, it led to the birth of virtualization.

Now we should know How virtualization works?

The key utilization of the virtualization is the server virtualization, in which a product layer called a hypervisor copies the basic equipment. Hypervisors, gives the product environment in which we construct the virtual environment.

The procedure of Virtualization would incorporate the CPU’s memory, I/O and system activity. The utilization of the virtual framework is not equivalent to the execution of the working framework, the idea will be utilized by the applications that needn’t bother with the full utilization of the fundamental equipment.

With the virtualization innovation, the utilization of the equipment can be boosted. In any case, there are a few confinements that we have to set every one of the setups for the virtual machines the way we do it for the host machines. Neglecting to do as such, the vindictive clients can assault the framework by means of web and challenged person different PCs, virtual machines, or perhaps the host PC.

Benefits of Virtualization

  • Improves Performance
  • High Availability
  • Disaster Recovery
  • Cost Reductions
  • Flexibility
  • Efficient Utilization

We must have several layers of defense to secure our network. Our systems or  resources can be configured in the way that they have multiple layers of defense. Each layer will be protected by different layers of security. This will save the malicious users to invade the network privacy.