Determining Windows 2000 Network Security Strategies

Today, most organizations want their computer infrastructure connected to the Internet because it provides valuable services to their staff and customers. However, the services made available through Internet connection can be misused, which makes it necessary to employ network security strategies. Microsoft® Windows® 2000 includes a variety of technologies that you can use as you plan your network security strategy. These technologies can also be useful if your network security issues are internal to your organization or if your external network connections are to networks other than the Internet. For more information about internal security, see "Planning Distributed Security" in this book.

The strategic use of security technologies to protect your company's network connections to the Internet or other public networks is discussed in this chapter. This chapter does not provide details about how to install and use network security technologies. Network architects involved in network security design and system administrators involved with administering network security need to read this chapter. As a prerequisite to performing the tasks outlined in this chapter, you need to be familiar with network and Internet technologies, such as routing, network protocols, and Web serving.

In This Chapter

Planning for Network Security

Developing Strategies for Secure Network Connections

Deploying Network Security Technologies

Planning Task List for Determining Network Security Strategies

Chapter Goals

This chapter will help you develop the following planning documents:

  • Network security plan

  • Deployment plan for network security technologies

  • For more information about implementing and using relevant Windows 2000 network security technologies, see the Microsoft ® Windows ®  2000 Server Resource Kit Internetworking Guide.

  • For more information about IPSec, see the Microsoft ® Windows ®  2000 Server Resource Kit TCP/IP Core Networking Guide.