Join Greg Sowell for an in-depth discussion in this video Firewalls and security zones, part of Foundations of Networking: Network Media (WANs).
- View Offline
- [Voiceover] In networking, firewalls are…application-specific appliances.…While they will share many features with routers,…they often lack a few key tools, like policy-based routing.…Firewalls today are considered stateful.…Stateful means they keep track of the…state of protocols traversing them.…Only packets, part of a valid connection,…or specifically allowed traffic,…will be allowed through the firewall.…By default, most firewalls block all traffic.…No traffic will move through…until you update policies to allow it.…
Once it's allowed, a connection entry…will be placed for it monitoring…all further packets in that stream.…Some firewalls employ a concept known as security zones.…Security zones are logical constructs…to which one or more interfaces…on the device are bound.…In a firewall that supports security zones,…you must have at least two zones configured,…which will offer protection between the two.…Two zone configurations usually…define an outside and an inside.…
The outside is the internet.…And the inside will be the secure…
He discusses different WAN technologies and features such as speeds, spans, and price points—including inexpensive options such as VPN. He then covers switches (the devices that connect computers in your building) and routers (devices that control the transmission of network data). Along the way, Greg shows how to build private connections, implement free networking over the Internet, build switch networks, and overlay-routed networks. He'll also introduce different routing protocols, such as OPSF link-state routing and distance-vector routing with RIPv2, EIGRP, and BGP.
Note that this course maps to domains 1 and 2 of the Microsoft Technology Associate (MTA) Networking Fundamentals certification exam (98-366).
- Understanding the technology: from dial-up to VPNs
- Working with hubs, bridges, and switches
- Ensuring hardware redundancy
- Using switching types and MAC tables
- Preventing bridge loops with STP
- Routing with routing tables
- Using NAT
- Securing your switches and routers
- Setting up firewalls
- Working with different routing protocols: RIPv2, OSPF, EIGRP, and more