HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Distributed Network Security - From Firewall to Network Partitioning
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Distributed Network Security - From Firewall to Network Partitioning  
> Access to the content HTML Beginning of the presentation
articles The text of the speech is also available.  
> Description The security of the perimeter was the first concern in network security. Many sites installed security mechanisms of the firewall type, or at least TCP/IP filters, on their Internet connection. It is now necessary to taker care of the security of the internal network, and to set up security between the various entities: students, laboratories, administration for example. For that, it is not necessary to add security devices, but simply to organize oneself to partition the network by using the existing hardware.  
> Context & Dates Talk made at the JRES 99 conference, on 30 November 1999.
 
> Author Hervé Schauer (Herve.Schauer@hsc.fr) 
> Type 56 slides [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Agenda

Examples
Problèmes
Solutions ?
Analyse
Solution réaliste

Le cloisonnement de réseau
Qu'est-ce que le cloisonnement de réseau ?
Principales applications
Pourquoi le cloisonnement de réseau par rapport à d'autres techniques de sécurité ?
Est-ce que le cloisonnement de réseau satisfait tout le monde ?
Quand utiliser et recommander le cloisonnement de réseau ?
Performance du cloisonnement de réseau
Scalabilité du cloisonnement de réseau
Limites du cloisonnement de réseau
Contrôles de niveau applicatif
Cloisonnement de réseau & systèmes de détection d'intrusion
Relation avec la gestion des VLANs, des VPNs & d'IPsec
Évolutions futures du cloisonnement de réseau

Hardware & Software
Filtering Devices
Policy Definition Tool & filter generation
First configuration set-up

Études de cas
Sécurité Internet
Sécurité Internet & extranet
Plateforme de commerce électronique
Fournisseur d'accès Internet
Fournisseur d'accès Internet de communauté
Réseau industriel maillé
Réseau industriel maillé et d'agences
Réseau bancaire d'agences

Conclusion
Références et ressources  

> Related documents
themeNetwork Partitionning
[Presentation]  Deperimetrization or not ? [22 November 2007 - French]
[Presentation]  Network security stakes [14 October 2004 - French]
[Article]  Networks Security [25 July 2000 - French]
[Presentation]  Distributed Network Security [12 May 2000 - English]
[Presentation]  Distributed Network Security [15 December 1999 - English]
[Article]  Distributed Network Security - From the Firewall to Network Partitionning [November 1999 - French]
[Presentation]  Le cloisonnement de réseaux [18 August 1999 - English]
[Article]  Network Partitioning [August 1997 - French]
[Presentation]  Private networks partitioning [8 July 1997 - French]
[Presentation]  Intranets partitioning [June 1997 - French]
> Copyright © 1999, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 23 October 2002 at 14:17:24 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants