From the course: Cisco Network Security: Core Security Concepts

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Zone defense

Zone defense - Cisco Tutorial

From the course: Cisco Network Security: Core Security Concepts

Start my 1-month free trial

Zone defense

- [Instructor] When thinking about a network, some areas are more trustworthy than others. In a network we segment each part of the network by logical zones where we can identify the level of trust for each zone. Firewalls inspect and filter traffic according to a set of access control rules. That either allow or deny certain types of traffics between zones, when designing a network, a perimeter network is the boundary between the trusted and untrusted network. This allows an organization to deploy public services such as email and web servers while isolating the internal network and provides an additional layer of protection, in this graphic we see a logical drawing of the outside network or internet, the inside or LAN and then we see in the center the demilitarized zone or DMZ. Isolation on a network occurs by configuring a demilitarized zone, or screen subnet. Where the firewall filters traffic between the outside world and the local area network. We call it a screen subnet because…

Contents