Thursday, May 3, 2012

Secure Perimeter Routers & Disable Services & Logging

Secure Perimeter Routers & Disable Services & Logging    

There are three different types of networks:
  • Trusted
  • Untrusted
  • Unknown

Trusted Networks:
Trusted networks are the networks inside your network’s security perimeter. These are the networks you are trying to protect. Often, someone in your organization’s IT department administers the computers that these networks comprise, and your enterprise’s security policy determines their security controls. Usually, trusted networks are within the security perimeter.

Untrusted Networks:
Untrusted networks are the networks that are known to be outside your security perimeter. They are untrusted because they are outside of your control. You have no control over the administration or security policies for these networks. They are the private, shared networks from which you are trying to protect your network. However, you still need and want to communicate with these networks even though they are untrusted. Untrusted networks are outside the security perimeter and external to the security perimeter.

Unknown Networks:
Unknown networks are networks that are neither trusted nor untrusted. They are unknown to the security router because you cannot explicitly tell the router that the network is a trusted or an untrusted network. Unknown networks exist outside your security perimeter.

Ingress filtering allows you to control the traffic that enters your network and restrict activity to legitimate purposes.
Egress filtering controls the traffic headed out of your network.
  • No outbound traffic bears a source IP address not assigned to your network. (This is the basic egress filtering rule.)
  • No outbound traffic bears a private (non-routable) IP address. (This should be true anyway, but it's a good idea to block and log this type of traffic to determine the source of the error.)


1 comment:

  1. This is a very good blog post as I am able to understand the topics easily. The topic on Secure Perimeter Routers & Disable Services & Logging is explained clearly and in a proper format which enables the user to understand the topic easily. Through this blog, I was able to understand that there are three different types of networks and I am able to explain the difference between each of them. The other blog posts are clearly explained as well and provide a very clear understanding of the topic. For instance, the topic on Perimeter router, internal router and firewall, allowed me to understand the different types of router as well as how the different types of firewall operates.rent types of firewall operates.
    -Amos

    ReplyDelete