From the course: Cisco Network Security: Core Security Concepts
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Zone defense - Cisco Tutorial
From the course: Cisco Network Security: Core Security Concepts
Zone defense
- [Instructor] When thinking about a network, some areas are more trustworthy than others. In a network we segment each part of the network by logical zones where we can identify the level of trust for each zone. Firewalls inspect and filter traffic according to a set of access control rules. That either allow or deny certain types of traffics between zones, when designing a network, a perimeter network is the boundary between the trusted and untrusted network. This allows an organization to deploy public services such as email and web servers while isolating the internal network and provides an additional layer of protection, in this graphic we see a logical drawing of the outside network or internet, the inside or LAN and then we see in the center the demilitarized zone or DMZ. Isolation on a network occurs by configuring a demilitarized zone, or screen subnet. Where the firewall filters traffic between the outside world and the local area network. We call it a screen subnet because…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.