Table of Contents
Module 2 - Design the Network Structure
Section 6 - Provision Software Features
Jones, Jones, & Jones: Solution
-
Mr. Jones has been reading about hackers accessing confidential data by
hacking into the network from the Internet. How have you addressed his
concerns with your design?
-
For foolproof network security, a three-part firewall system locates Jones's
Web/FTP server behind the first tier. To access this tier, users come through
a router that provides initial security. Beyond this first tier is Cisco's
PIX Firewall, which represents the second-tier security perimeter. In case
there is a breach of security on the exposed segment, the PIX Firewall
series acts as a strong security barrier to prevent outside users from
gaining access to Joness private network. Using Cisco's PIX Firewall series
with Cisco routers running Cisco IOS software will provide the firm with
a powerful security solution that will allow it to sell its research papers
without fear of exposure of internal documents and files. It forces hackers
to penetrate multiple lines of defense.
Click on the Back button in your browser to review Section 6 of Module
2. If you are finished with that section, click
here to go on to Section 7.
Copyright Cisco Systems, Inc. -- Version 2.0 7/98