Secure Networking Best Practices for Municipalities

 
Sample Diagram
 
 
 
 
 
 
WWW
 
CSA
 
Other
Municipalities
 
 
Internet
Router
 
Intrusion
 
Detection
 
Extranet
 
(
Dedicated Circuits
)
 
VPN to Municipalities via Internet
       See Figure C-1-D in CJIS Policy
 
Router/Firewall/VPN
 
AA Server
 
CAD System (CJI)
128-bit TLS
 
CAD Clients
TLS Web App.
hosted by State
 
Other Department
workstations/Local 802.11X LAN
 
Non-LE
VLAN (see following slide)
 
LE
VLANs
 
   CAD Client w/AA
   TLS Web App. hosted
     by State with AA
   See following slide
    for more examples
 
Other Relationships:
  Fiber to other Facilities
  SAN Storage (CJI ?)
     Regional Provider
      (CSA approved)
 
Remote
Admin?
 
What we would like to see
 
 
 
 
 
 
WWW
 
CSA
 
Other
Municipalities
 
 
CISCO
2800
IOS v6.1
 
IBM
 
Proventia
 
CISCO 2800/v6.1
 
(
Dedicated Circuits
)
 
VPN to Municipalities via Internet
          (See Figure C-1-D in CJIS Policy)
 
CISCO ASA 5505
 
AA Server (RSA)
 
CAD System (CJI) 
Tritech
Perform
 128-bit TLS
 
CAD Clients
TLS Web App.
hosted by State (Name of
State System)
 
Other Department
workstations/Local 802.11X LAN
(if 802.11X used for CJI see CJIS
Policy 5.5.7)
 
Non-LE
VLAN (see following slide)
 
LE
VLANs
 
   CAD Client w/AA (RSA)
   TLS Web App. hosted
     by State with AA
   See following slide
    for more examples
 
Other Relationships:
  Fiber to other Facilities
    SAN Storage (CJI ?)
      Regional Provider
       (CSA approved)
 
Remote
Admin?
 
RMS System (CJI)
TriTech Perform
 
Netmotion
Mobility XE
 
5.5.7.1 All 802.11x Wireless Protocols
 
Segregate, virtually (e.g. virtual local area network (VLAN) and ACLs) or
physically (e.g. firewalls), the wireless network from the operational wired infrastructure.
Limit access between wireless networks and the wired network to only operational
needs.
 5.10.1.4 Voice over Internet Protocol
 
 
VoIP can be installed in-line with an organization’s existing Internet Protocol
(IP) services.
  Among VoIP’s risks that have to be considered carefully are: myriad security
concerns, cost issues associated with new networking hardware requirements, and
overarching quality of service (QoS) factors.
In addition to the security controls described in this document, the following additional
controls 
shall be implemented when an agency deploys VoIP within a network that
contains unencrypted CJI
:
1. Establish usage restrictions and implementation guidance for VoIP technologies.
2. Change the default administrative password on the IP phones and VoIP switches.
3. Utilize Virtual Local Area Network (VLAN) technology to segment VoIP traffic from
data traffic.
 
VLANS
 
VLANs
 
Mobility XE examples
 
Source: http://discover.netmotionwireless.com/rs/netmotionwireless/images/NetMotion-Wireless_Security-Wireless-Networks_WP.pdf
 
Source: http://discover.netmotionwireless.com/rs/netmotionwireless/images/NetMotion-Wireless_Security-Wireless-Networks_WP.pdf
Slide Note
Embed
Share

Explore the implementation of secure networking practices for municipalities, including dedicated circuits, VPN connections, VLAN segmentation, and VoIP considerations. Learn about maintaining network integrity and protecting sensitive information in compliance with CJIS policies.

  • Secure Networking
  • Municipalities
  • VPN
  • VLAN Segmentation
  • CJIS Compliance

Uploaded on Jul 20, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Sample Diagram

  2. FIPS.gif (Dedicated Circuits) VPN to Municipalities via Internet See Figure C-1-D in CJIS Policy Other WWW CSA Municipalities Remote Admin? FIPS.gif Other Relationships: Fiber to other Facilities SAN Storage (CJI ?) Regional Provider (CSA approved) Internet Router Intrusion FIPS.gif Detection Extranet AA Server Router/Firewall/VPN CAD System (CJI) 128-bit TLS LE Non-LE VLAN (see following slide) VLANs CAD Client w/AA TLS Web App. hosted by State with AA See following slide for more examples Other Department workstations/Local 802.11X LAN CAD Clients TLS Web App. hosted by State

  3. What we would like to see

  4. (Dedicated Circuits) VPN to Municipalities via Internet (See Figure C-1-D in CJIS Policy) Other WWW CSA FIPS.gif Municipalities Remote Admin? FIPS.gif Other Relationships: Fiber to other Facilities SAN Storage (CJI ?) Regional Provider (CSA approved) CISCO 2800 IOS v6.1 IBM FIPS.gif Proventia CISCO 2800/v6.1 CISCO ASA 5505 AA Server (RSA) RMS System (CJI) TriTech Perform Netmotion Mobility XE CAD System (CJI) Tritech Perform 128-bit TLS LE Non-LE VLAN (see following slide) VLANs CAD Client w/AA (RSA) TLS Web App. hosted by State with AA See following slide for more examples Other Department workstations/Local 802.11X LAN (if 802.11X used for CJI see CJIS Policy 5.5.7) CAD Clients TLS Web App. hosted by State (Name of State System)

  5. VLANS 5.5.7.1 All 802.11x Wireless Protocols physically (e.g. firewalls), the wireless network from the operational wired infrastructure. Limit access between wireless networks and the wired network to only operational needs. Segregate, virtually (e.g. virtual local area network (VLAN) and ACLs) or 5.10.1.4 Voice over Internet Protocol (IP) services.Among VoIP s risks that have to be considered carefully are: myriad security concerns, cost issues associated with new networking hardware requirements, and overarching quality of service (QoS) factors. In addition to the security controls described in this document, the following additional controls shall be implemented when an agency deploys VoIP within a network that contains unencrypted CJI: 1. Establish usage restrictions and implementation guidance for VoIP technologies. 2. Change the default administrative password on the IP phones and VoIP switches. 3. Utilize Virtual Local Area Network (VLAN) technology to segment VoIP traffic from data traffic. VoIP can be installed in-line with an organization s existing Internet Protocol

  6. VLANs

  7. Mobility XE examples

  8. Source: http://discover.netmotionwireless.com/rs/netmotionwireless/images/NetMotion-Wireless_Security-Wireless-Networks_WP.pdf

  9. Source: http://discover.netmotionwireless.com/rs/netmotionwireless/images/NetMotion-Wireless_Security-Wireless-Networks_WP.pdf

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#