This document is a sample of written work only. Copyright remains the property of the respective owners.
Segmenting the network and enforcing user access
  control
Managing Bottlenecks
Controlling Network Bandwidth
Protecting Network from Intrusion and Virus Attack
Upgrading the Firmware
Conclusion

Protecting Network from Intrusion and Virus Attack
Security threat is an area administrators have to handle constantly. Today, security threat is no longer just coming from outside the organization. Industry findings actually indicate a high percentage of security threat comes from the inside. As administrators, we must therefore always be on the lookout to take intuitive prevention steps from within the network at the end points right through to the external.

In most cases, spoofed addresses are being used by intruders to infiltrate the network, and this can cause some critical applications to go down or a security breach coming from certain network hosts being infected by virus or worm. When such a case happens, the entire network can be in jeopardy. Infected hosts can generate excessive loads of traffic which can cause the slowing down of applications on the network, loss of data, or even bring down the entire network.

A way to get rid of network intrusion, spoofing and virus attack is to have a smart switch that detects and blocks network hosts with spoofed addresses through the tracking of IP addresses assigned by the DHCP server to every host in the network. A defense mechanism should also be included with the smart switch to protect against attacks targeted at the switch and to ensure its availability even in the worse traffic condition. Essentially, this means the smart switch should have:

• DHCP Snooping & ARP Snooping Prevention to keep track of IP addresses assigned by the
  DHCP server to every host in the network, detect and block network host with spoofed
  address

• Defense mechanism to protect the CPU from traffic flooding caused by virus or worm attack

 
< PREVIOUS    NEXT >