This article discusses network security fundamentals, vulnerabilities in the network, explanation of security devices, need for placing security devices, requirement of network segregation, firewall rules and policies, developing IDS/IPS policies, and security policies for Lucent Pharma network. It also includes the author's note, table of contents, and bibliography.