Designing More Secure LANs

3COM

Publisher: 3Com, 1992, 58 pages

Keywords: IT Security, Networks

Last modified: May 16, 2021, 11:52 p.m.

A practical guide to the 3Com LAN Security Architecture

  • Introduction
    • Purpose of this guide
    • Who should read this guide?
  • Background
    • Is information worth protecting?
    • Who to protect against?
    • Successful security
    • LAN security threats
    • Risk assesment
  • 3COM LAN Security Architecture (LSA)
    • Baseline measures
    • Additional counter-measures
    • Secure network management
    • Network device audit log
  • Practical Examples of LAN Security Design
    • Increasing LAN availability — protecting LAN services
    • LAN service to the desk
    • Restricting access — Closed User Groups
    • Overcoming broadcasts: secure networks/existing networks
    • Tracking network devices
    • Proactive device attachment control
    • Maintaining information integrity
  • Case Studies
    • Case Study 1: Designing security into a new LAN
    • Case Study 2: Adding security to an existing LAN
    • Building blocks
    • Further reading

Reviews

Designing More Secure LANs

Reviewed by Roland Buresund

Mediocre **** (4 out of 10)

Last modified: May 21, 2007, 3 a.m.

An ad from 3Com, containing some useful information.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required