Security Practice: library network maintenance case

Source: Internet
Author: User

Talking about network cabling, network security, and issues that every enterprise is very concerned about, is even more eye-catching in the face of computer network security issues in public places of many small and medium enterprises. It is well known that people accessing the Internet in such a public place are very complicated, with extraordinary malicious damage. So how can we ensure the normal operation of the networks in these public places and ensure the security of hosts at all times? This is the topic to be discussed today.

Library Network Environment

The library is located in bustling downtown with 110 computers, including three cash register computers and a membership charging system. The network is connected to 10 m optical fiber through China Telecom, using four switches, one wireless router, and one hardware firewall. The overall network is operated by a wireless network and a wired network. The wired network is mainly used to face non-mobile hosts, while the wireless network is used to allow laptop users to access the Internet conveniently.

 

Figure 1 network extensions

After the Library's network is connected from a computer device, it uses a hardware firewall to access a wireless route to spread wireless signals. Five connection lines are separated from each other to access the switch, and then the switches are connected to each host.

The Internet administrator of the host device selects a password-lock chassis to prevent hardware loss caused by the opening of the chassis.

Library computer settings

In the face of the network administrator who just took over the library, the computer was first cleared of internal dust to improve the heat dissipation of the Cpu and achieve rapid system operation. Then reinstall the computer system. After the system is installed, security settings are started.

Cashier host Security

This host is related to money posting, so pay special attention to security issues. The following is a security setting method. First, enable the built-in firewall in the system (this is very simple, not detailed here). Then, a port security policy is set up, which causes many harmful virus ports.

 

Figure 2 Port Security Policy

To create an IP Security Policy, choose "start"> "Control Panel"> "Administrative Tools"> "Local Security Policy"> "Local Security Settings"> "IP Security Policy" and create an IP Security Policy on the local computer. IP Filter list-add-pop-up-IP Filter wizard-IP Source-source address (my IP address-target address (any IP address ).

The closed port in the filter attribute. Select protocol type-TCP (UDP)-to this port-text box and enter (port number, for example: 3389). At this time, a port blocking policy is completed, repeat this step to implement multi-port blocking.

(Note: you can find the latest virus attack port number in the search engines)

After completing the above two points of security, the ESET NOD32 antivirus software is installed in the system, and the strict protection mode in the antivirus software is enabled, so that the Cashier host cannot be found on the network, it avoids attacks and access from the Intranet and reduces the harm of data loss and destruction.
 

Figure 3 NOD32 strict protection mode

The simple protection of a cash register is complete. Although only firewall, anti-virus software, and port security policies are used, hackers, attacks, and viruses and Trojans are blocked in a large sense. (The other cash register machines are the same as above)

Reader Internet Security

It is normal for a public machine like a library to access the Internet. To ensure the smooth and secure network connection, we can perform this step in two steps.

First, disable the firewall and automatic update in the security center of the control panel, and then view the virtual memory of the local machine. Generally, the virtual memory settings can be determined based on the memory size of the current computer.

 

Figure 4 control panel Security Center
 

Figure 5 virtual memory settings

After completing the above system acceleration settings, install the system restoration software to restore the system to the performance after the system is restarted. Here, I installed the software: Ice restore, the setting is completely silly, as long as you follow the next step to complete the settings, you can complete the full protection.

 

Figure 6 restoration wizard

For the freezing point interface, you only need to press Shift and double-click the ice point restoration icon in the lower right corner to bring up the page settings. To prevent customers from arbitrarily setting and changing the freezing point settings, the administrator can add the freezing point password to it. If you need to install alternative software in the computer during the protection process, you can set the effect of restoring the software once or several times after restarting in the ice recovery software, in this way, the freezing point restart is formed to protect computer security.


 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.