A perimeter network is the boundary between the trusted and untrusted network. Lisa Bock discusses zone-based firewall configuration, where zones are created and a trust level is assigned on each interface according to how much you trust the traffic from that interface.
- [Instructor] When thinking about a network,…some areas are more trustworthy than others.…In a network we segment each part of the network…by logical zones where we can identify…the level of trust for each zone.…Firewalls inspect and filter traffic…according to a set of access control rules.…That either allow or deny certain types of traffics…between zones, when designing a network,…a perimeter network is the boundary between the trusted…and untrusted network.…
This allows an organization to deploy public services…such as email and web servers while isolating…the internal network and provides an additional layer…of protection, in this graphic we see a logical drawing…of the outside network or internet, the inside or LAN…and then we see in the center the demilitarized zone…or DMZ.…Isolation on a network occurs by configuring…a demilitarized zone, or screen subnet.…
Where the firewall filters traffic between the outside world…and the local area network.…We call it a screen subnet because it's a separate…subnetwork as we see from the IP address.…
Released
9/21/2017- Security principles and terms
- SIEM technology
- Common security threats
- Social engineering
- Data loss prevention
- Cryptographic concepts
- Symmetric and asymmetric encryption
- Hash algorithms
- Network topologies, CAN, WAN, and SOHO
- Securing a virtual environment
Share this video
Embed this video
Video: Zone defense