Not a week ago that we don’t hear about a breach or identify theft, there are security devices such as Firewalls, Switches, Routers, NIDS/NIPS, VPN concentrator, SIEM, DLP, NAC, SSL/TLS accelerator, Proxy, Load Balancers, Wireless Access points, bridges , Mail/Media Gateway , Hardware Security Modules which are used to either block the threats or delay it.
Routers are used to connect the networks and operate at Layer 3 of the OSI model. A router stores information about network destinations. A border router is an outside connection of a LAN to an external WAN.
Access Control Lists (ACL): It is used to filter packets by source address, a destination address, protocol, or port.
Zones: Segmenting networks based on functionality or security.
Antispoofing: By creating access lists which can block access to private IP addresses and localhost ranges from the internet.
It connects devices with a computer network, by using packet switching to receive, process and forward data to the destination. It works on Layer 2/Layer 3 of the OSI model.
Packet-forwarding decisions are based on MAC (Media Access Control)
VLANs: Segment networks and limit broadcast traffic.
Port Security – Enable/Disable, individual switches ports based on MAC address.
- It Provides Loop prevention
- It ProvidesFlood Guard
It is a boundary device between internal and external networks
It’s a device that acts on behalf of others and provides security, logging, and caching
- Proxy Server – Blocks known malicious websites
- Forward Proxy – Retrieves data on behalf of a client
- Reverse Proxy – Protects access to a server on the internal network
- Transparent Proxy/inline/forged proxy/aka intercepting – A caching server that redirects client’s requests without modifying them to reduce bandwidth usage.
What are FireWallSs?
These are the Network security system which monitors the incoming and outgoing network traffic based on predetermined security rules.
For more information on Technologies/best practices.