(Data Core Security Best Practices 1 Contents 31 Security Threats to the Enterprise Network Data Core 41.1 Unauthorized Access 51.2 Impersonation 61.3 Denial of Service 61.4 Distributed Denial of Service d/dos72 Deploying Layer 2 Security in the Data Core 72.1 MAC Flooding 82.2 ARP Spoofing 122.3 Spanning Tree Attacks 152.4 DHCP Failure Attacks 193 Data Core Integration Security 233.1 Unauthorized Access 243.2 Denial of Service Attacks 253.3 Network Reconnaissance and Viruses, Worms 273.4 IP Spoofing 283.5 Layer 2 Attacks 303.6 Data Core Network Infrastructure Security 303.7 Control of Network Devices Access 303.8 Routing Protocol Security Authentication 353.9 High Availability of Networks 364 Deployment Status Firewall 384.1 Overview 384.2 ServerFarm Status on the Network Divide Firewall 384.3 Status Firewall Inside Multilayer Server Zones 394.4 Packet Filtering 394.5 Firewall Attack Prevention 404.6 ASPF445 Deployment of Intrusion/Intrusion Prevention Systems ( IPS) 545.1 IPS Overview 545.2 IPS Deployment Methods 565.3 Software Configuration 58
Data Core Security Best Practices.doc)