{"id":6398,"date":"2019-09-04T12:18:18","date_gmt":"2019-09-04T09:18:18","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=6398"},"modified":"2019-11-15T14:24:47","modified_gmt":"2019-11-15T11:24:47","slug":"vlan-security","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/vlan-security\/6398\/","title":{"rendered":"Ekstra g\u00fcvenlik katman\u0131 olarak VLAN"},"content":{"rendered":"<p>Her \u015firkette, b\u00fcy\u00fck hacimde harici posta ile ilgilenen baz\u0131 \u00e7al\u0131\u015fanlar vard\u0131r. Bunun en yayg\u0131n \u00f6rnekleri; \u0130K sorumlular\u0131, Halkla \u0130li\u015fkiler y\u00f6neticileri ve sat\u0131\u015f uzmanlar\u0131d\u0131r. D\u00fczenli olarak ald\u0131klar\u0131 postalara ilave olarak bu \u00e7al\u0131\u015fanlar, \u00e7ok say\u0131da istenmeyen posta, kimlik av\u0131 mesajlar\u0131 ve k\u00f6t\u00fc ama\u00e7l\u0131 ekler de al\u0131rlar. Dahas\u0131, bu ki\u015filer i\u015flerinin do\u011fas\u0131 gere\u011fi do\u011frulanmam\u0131\u015f ekleri a\u00e7mak ve yabanc\u0131 e-postalardaki ba\u011flant\u0131lara t\u0131klamak zorunda kal\u0131rlar. Bilgi g\u00fcvenli\u011fi profesyonelleri genellikle, bunlarla u\u011fra\u015fan departmanlar\u0131 kurumsal a\u011f i\u00e7inde kritik \u00f6nem arz eden d\u00fc\u011f\u00fcmlerden ar\u0131nd\u0131r\u0131rlar. Ancak \u00f6zel BT g\u00fcvenli\u011fi olmayan \u015firketlerde, bu departmanlar b\u00fct\u00fcn personel i\u00e7in \u00f6nemli bir tehdit olu\u015fturur.<\/p>\n<h2>LAN segmentasyonu<\/h2>\n<p>Kritik bilgilerle \u00e7al\u0131\u015fan \u015firket birimlerini vir\u00fcs bula\u015fma riskine kar\u015f\u0131 koruman\u0131n en etkili yollar\u0131ndan biri, kurumsal a\u011f\u0131 \u00e7ok say\u0131da otonom alt a\u011f b\u00f6l\u00fcmlerine ay\u0131rmakt\u0131r.<\/p>\n<p>\u0130deal bir senaryoda, tehlike potansiyeli bar\u0131nd\u0131ran b\u00fct\u00fcn departmanlar fiziksel olarak izole edilmelidir. Bunu yapmak i\u00e7in \u00e7ok say\u0131da modem kurman\u0131z ve bu modemleri kullanarak kurumsal a\u011f\u0131 ayr\u0131 alt a\u011flara b\u00f6lmeniz gerekir. Ancak bu \u00e7\u00f6z\u00fcm\u00fcn de \u00e7ok \u00f6nemli birka\u00e7 dezavantaj\u0131 var. \u0130lk olarak, ilave ekipman kurmak ilave masraf demektir; ikincisi ise, mevcut a\u011f altyap\u0131s\u0131n\u0131 de\u011fi\u015ftirmek sistem y\u00f6neticileri i\u00e7in her zaman \u00e7ok sanc\u0131l\u0131 bir s\u00fcre\u00e7tir.<\/p>\n<p>Daha kolay bir alternatif ise, hi\u00e7bir donan\u0131m\u0131 de\u011fi\u015ftirmeden tek bir fiziksel a\u011fdan yola \u00e7\u0131karak \u00e7ok say\u0131da mant\u0131ksal a\u011f kurmak amac\u0131yla sanal bir LAN (VLAN) kullanmakt\u0131r. Bu a\u011flar programlanabilir bir \u015fekilde yap\u0131land\u0131r\u0131l\u0131r; yani bu da kablolar dahi ayn\u0131 yerinde kalaca\u011f\u0131 anlam\u0131na gelir.<\/p>\n<h2>VLAN<\/h2>\n<p>VLAN teknolojisi en yayg\u0131n olarak, farkl\u0131 fiziksel modemlere ba\u011fl\u0131 olan (\u00f6rne\u011fin, farkl\u0131 ofislerde bulunan makineler) bilgisayarlar\u0131 tek bir alt a\u011f alt\u0131nda birle\u015ftirmek i\u00e7in kullan\u0131l\u0131r. Bu teknoloji baz\u0131 g\u00fcvenlik avantajlar\u0131 da sa\u011flar: Bir alt a\u011fdan di\u011fer alt a\u011fdaki cihazlara yetkisiz eri\u015fimi engellemenin yan\u0131 s\u0131ra, ayn\u0131 zamanda g\u00fcvenlik ilkesi y\u00f6netimini kolayla\u015ft\u0131rarak y\u00f6neticilerin tek seferde b\u00fct\u00fcn alt a\u011fa g\u00fcvenlik ilkeleri uygulamas\u0131na izin veriyor.<\/p>\n<p>VLAN sisteminden en iyi \u015fekilde faydalanabilmeniz i\u00e7in profesyonel seviye a\u011f ekipman\u0131na sahip olman\u0131z gerekiyor. Bununla birlikte VLAN teknolojisi, art\u0131k Keenetic gibi ev kullan\u0131m\u0131na uygun baz\u0131 modemler taraf\u0131ndan da destekleniyor.<\/p>\n<h3>Sihirli bir de\u011fnek de\u011fil<\/h3>\n<p>VLAN, her derde deva bir sistem de\u011fildir. Vir\u00fcs\u00fcn kritik d\u00fc\u011f\u00fcmlere yay\u0131lma \u015fans\u0131n\u0131 minimuma indirmeye yard\u0131mc\u0131 olur, ancak \u201crisk b\u00f6lgesindeki\u201d departmanlar i\u00e7in \u00f6zel bir koruma sunmaz. O y\u00fczden, g\u00fcvenli\u011fi elden b\u0131rakmamak i\u00e7in \u015funlar\u0131 da yapman\u0131z faydan\u0131za olabilir:<\/p>\n<ul>\n<li>Bilgi g\u00fcvenli\u011fi alan\u0131ndaki \u00e7al\u0131\u015fanlara gerekli e\u011fitimleri verin ve \u015f\u00fcpheli e-postalara kar\u015f\u0131 tedbirli davranmalar\u0131 i\u00e7in s\u0131k s\u0131k hat\u0131rlatmalar yap\u0131n.<\/li>\n<li>\u0130\u015f istasyonlar\u0131ndaki, a\u011flardaki ve di\u011fer cihazlardaki yaz\u0131l\u0131mlar\u0131 d\u00fczenli olarak g\u00fcncelleyin ki siber su\u00e7lular bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kullanarak altyap\u0131n\u0131za s\u0131zmas\u0131n.<\/li>\n<li>K\u00f6t\u00fc ama\u00e7l\u0131 program ve kaynaklar\u0131 tespit edip etkisiz hale getirebilmek amac\u0131yla, i\u015f istasyonlar\u0131 ve sunucular\u0131n\u0131z i\u00e7in <a href=\"https:\/\/kas.pr\/kdkesbtr\" target=\"_blank\" rel=\"noopener\">g\u00fcvenilir g\u00fcvenlik \u00e7\u00f6z\u00fcmleri<\/a> kullan\u0131n.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>\u015eirket d\u0131\u015f\u0131ndan gelen \u00e7ok say\u0131da e-postayla ilgilenmek zorunda olan \u00e7al\u0131\u015fanlar, k\u00f6t\u00fc ama\u00e7l\u0131 istenmeyen postalar\u0131n sald\u0131r\u0131s\u0131na u\u011frama riski ta\u015f\u0131rlar. Bu yaz\u0131m\u0131zda, bula\u015fma ihtimaline kar\u015f\u0131 \u015firket sistemlerinizi nas\u0131l koruyabilece\u011finizi a\u00e7\u0131kl\u0131yoruz.<\/p>\n","protected":false},"author":2484,"featured_media":6399,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[1039,2000,744,519,1999],"class_list":{"0":"post-6398","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-ag","11":"tag-alt-aglar","12":"tag-guvenlik","13":"tag-ipuclari-2","14":"tag-vlan"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/vlan-security\/6398\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/vlan-security\/16604\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/vlan-security\/13996\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/vlan-security\/18544\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/vlan-security\/16639\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/vlan-security\/15291\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/vlan-security\/19181\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/vlan-security\/17879\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/vlan-security\/23402\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/vlan-security\/28253\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/vlan-security\/12407\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/vlan-security\/11114\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/vlan-security\/20062\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/vlan-security\/24022\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/vlan-security\/24221\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/vlan-security\/18870\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/vlan-security\/23325\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/vlan-security\/23236\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/ag\/","name":"a\u011f"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=6398"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6398\/revisions"}],"predecessor-version":[{"id":6734,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6398\/revisions\/6734"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/6399"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=6398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=6398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=6398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}