Downloads: 135 | Views: 290
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017 | Popularity: 6.6 / 10
Implementing Different Set of Network Security Policies for a Well Infrastructure Campus Network
Faqarunnisa Begum, Dr. Suvarna Nandyal
Abstract: A typical college network has several number of sub-networks or subnets which corresponds to different departments or sections of the organization. These sub-networks are interconnected through Layer-3 network devices or routers. The services accessed by these sub-networks within the subnet internally and outside the subnets externally are usually governed by the set of network security policies. A network security for an organization at every level in day to day life is an important aspect. In order to provide the security for a college campus here in this paper a topology is designed and implemented with the set of network security policies. There are different levels of Access Control List-ACL rules for the student, staff and network administrator to protect their sub-network. To prevent unauthorized access to the resources, appropriate security policies have been implemented in the Campus Area Network-CAN. The network admin, teachers and the student uses the college resources provided by the two servers i. e. FTP-File Transfer Protocol server and the WEB server. To further enhance the security, the different methods of network security like use of separate subnets, VLAN, ACL, VTP, routing protocols, access control list etc. , have been used.
Keywords: Campus Area Network-CAN, ACL, Network Security Policies, Cisco routers, switches, VLAN
Edition: Volume 6 Issue 6, June 2017
Pages: 1501 - 1506
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023
Pages: 734 - 741Enhanced Congestion Control in Wireless Networks: A Joint Random Early Detection and Drop Tail Mechanism
S. Mohanarangan, R. Kalaivani Sri, P. Nithya, M. Sowndharya, M. Hemamalini
Downloads: 108
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1148 - 1153ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS
Abdul Jawad PP, Bismin Chacko
Downloads: 113
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1209 - 1212NICE-D: A Modified Approach for Cloud Security
Nikita T. Ramteke, Dr. Yashwant V. Chavan
Downloads: 113
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2064 - 2079Survey of Various Open Source Network Simulators
Uma R Pujeri, Dr. V Palanisamy
Downloads: 120
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1316 - 1323A Framework for Implementing Realistic Custom Network Topology in Mininet
Veena S, Chandan Pal, Ram P. Rustagi, K. N. B. Murthy