PRACTICAL SECURITY TECHNIQUES IN IP NETWORKS

Objectives and outcomes

The acquisition of knowledge in the field of IP security. The configuration of basic protection
techniques. Maintenance of protected computer networks based on IP protocol in LAN, MAN
and WAN environments. Upon completion of the course, students will master the techniques and
protocols for configuring security in a computer network. They will know how to define the basic
problems related to the network protection and security and suggest techniques and devices that
would implement a secure transmission. They will know how to configure defined security policies, to
maintain them and solve possible problems.

Lectures

IP network security issues and problems. Types of attacks and protection techniques. L2 level
protection. MAC address filtering, DHCP snooping. Access lists for MAC address filtering. VLAN
protection. Access lists and their use in IP networks. The definition of DMZ. NAT and PAT using access lists.
Routing protocol protection. Defining an access policy. SSL and SSH access to network equipment. Using
the router as the basic firewall device. A network firewall device, the introduction to the operating system,
and the operation of the device. The implementation and configuration of devices without and with a
militarized zone. Remote network access problems. Connecting remote locations over the Internet.
The overview and configuration of VPN tunnels. The overview of more advanced protection techniques.

Practical classes

Practical classes follow the material presented in the lectures and are conducted using Cisco
equipment and appropriate simulators.