Diagram 1: Traditional ServicesDiagram 2: The New ParadigmDiagram 3: Router Security ProblemsDiagram 4: Lack of Internal SecurityDiagram 5: Too LargeDiagram 6: Limited Internet ConnectionsDiagram 7: Cleartext WAN CommunicationsDiagram 8: Lack of accurate Security PolicyDiagram 9: Collateral DamageDiagram 10: Nonperforming Secure NetworkDiagram 11:High Performance Nonsecure NetworkDiagram 12: Proper SecurityDiagram 13: Backbone ProviderDiagram 14:Internet ConnectivitySingle Points of FailureDiagram 15:Redundant Internet ConnectivityDiagram 16: Policy Based NetworkingDiagram 17: Our NetworkDiagram 1: Traditional ServicesFILE ServerMAILFILE ServerMAILDiagram 2: The New ParadigmROUTERROUTER“PASSWORD”Diagram 3: Router Security ProblemsDiagram 4: Lack of Internal SecurityBuilding Network InfrastructureEngineeringMarketingMalicious TrafficInternet TrafficNetwork InfrastructureDiagram 5: Too LargeOrganizationCentralOfficeDiagram 6: Limited Internet Connections“All Communications are clear”Central SiteRBOC“Cloud”Remote SiteDiagram 7: Cleartext WAN CommunicationsRequired TrafficIllegitimate TrafficDiagram 8: Lack of accurate Security PolicySAFEDiagram 9: Collateral DamageVulnerable CommunityCompromised HostSAFESAFECompromisedFILE ServerMAILDiagram 10: Nonperforming Secure NetworkSwitched NetworkREMOTEUSERNT RAS ServerDiagram 11:High Performance Nonsecure NetworkIllegitimate TrafficRequired TrafficDiagram 12: Proper SecurityEngineeringMarketingSALESBackboneDiagram 13: Backbone ProviderOrganizationData CenterCentralOfficeDiagram 14:Internet ConnectivitySingle Points of FailureData CenterCentralOfficeOrganizationData Center#2…10Alternate Means(Satellite,Other Cos,Cable) Diagram 15:Redundant Internet ConnectivityNetwork SwitchDiagram 16: Policy Based NetworkingFinanceDiagram 17: Our NetworkKey Intranet ServersLotus Notes for purchasingOracle 8 Manufacturing ServerManufacturingKey TrafficCommerce PortsHTTP, DNS, IDENTNOTES,SQLTELNETKey Servers from InternetInternet Commerce ServerWWW server for
View Full Document