HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Private networks partitioning
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Private networks partitioning  
> Access to the content HTML Beginning of the presentation  
> Description The security of the perimeter was the first concern in network security. Many sites installed security mechanisms of the firewall type, or at least TCP/IP filters, on their Internet connection. It is now necessary to taker care of the security of the internal network, and to set up security between the various entities: students, laboratories, administration for example. For that, it is not necessary to add security devices, but simply to organize oneself to partition the network by using the existing hardware.  
> Context & Dates Lecture made before the SUR group from the OSSIR , on 8 July 1997.
 
> Author Hervé Schauer (Herve.Schauer@hsc.fr) 
> Type 34 slides [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Plan
Introduction
Partitionnement
Domaine de sécurité
Périmètre de sécurité
Deux modèles de sécurité réseau
Sécurité des domaines
Sécurité des périmètres
Partitionnement et réseaux locaux
Partitionnement et connexion Internet
Partitionnement d'un réseau vs Interconnexion de réseaux
Réseau public et réseau privé
Couches d'application de la sécurité
Démarche de partitionnement
Déterminer les domaines de sécurité
Déterminer les flux
Dessiner les flux
Appliquer sa politique de sécurité aux flux
Appliquer les flux aux équipements de cloisonnement
Cellule de sécurité
Equipements de cloisonnement
Génération des filtres
Infogérance
Conclusion  
> Related documents
themeNetwork Partitionning
[Presentation]  Deperimetrization or not ? [22 November 2007 - French]
[Presentation]  Network security stakes [14 October 2004 - French]
[Article]  Networks Security [25 July 2000 - French]
[Presentation]  Distributed Network Security [12 May 2000 - English]
[Presentation]  Distributed Network Security [15 December 1999 - English]
[Presentation]  Distributed Network Security - From Firewall to Network Partitioning [30 November 1999 - French]
[Article]  Distributed Network Security - From the Firewall to Network Partitionning [November 1999 - French]
[Presentation]  Le cloisonnement de réseaux [18 August 1999 - English]
[Article]  Network Partitioning [August 1997 - French]
[Presentation]  Intranets partitioning [June 1997 - French]
> Copyright © 1997, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 17 April 2002 at 16:36:49 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants