Join Lisa Bock for an in-depth discussion in this video Perimeter networks, part of Foundations of IT Security: Network Security.
- View Offline
A perimeter network allows an organization…to deploy public services such as email and web servers…while isolating the internal network.…Isolation occurs by configuring a demilitarized zone,…or screen subnet, where the traffic is filtered…by a firewall placed in between the outside world…and the local area network.…It's called a subnet because it is a separate network.…Every interface on a router is a separate network.…A DMZ is from the term demilitarized zone,…an area between countries where…only authorized parties are allowed.…
To add another layer of security,…a DMZ can be designed in a few ways.…One way is, as we see it here, which is a multi-homed…or three-legged firewall.…A couple of concerns with this configuration.…The firewall must be able to handle all traffic…going to the DMZ as well as the internal network,…and is essentially a single point of failure.…A more secure approach is to use a DMZ with two firewalls.…The web and mail servers are accessed by external…as well as internal users, but they don't need to…
Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information.
- Implementing secure content management (SCM)
- Implementing unified threat management (UTM)
- Introducing VLANs
- NAT addressing
- Network sniffing
- Understanding common attack methods, such as password attacks
- Protecting clients with antivirus software
- Implementing physical security