From the course: IT Security Foundations: Network Security

Unlock the full course today

Join today to access over 22,700 courses taught by industry experts or purchase this course individually.

Recognizing perimeter networks

Recognizing perimeter networks

From the course: IT Security Foundations: Network Security

Start my 1-month free trial

Recognizing perimeter networks

- [Narrator] Malicious actors are constantly trying to gain access to our networks. One way to defend against a direct attack is by using a perimeter network. This provides a barrier between a trusted network and an untrusted network, such as the internet. The barrier isolates the internal network. Isolation occurs by configuring a demilitarized zone or screen subnet. Now, this is where the traffic is filtered by a firewall placed in between the outside world and the local area network. For example, the DMZ might be used to house a mail or a web server. The DMZ is also a great place to put a honeypot to trap hacking attempts. Now, the DMZ can be designed in a few ways. One way is as we see here which is called multi-home or three-legged firewall. Now, there are a couple concerns about this configuration. The firewall must be able to handle all the traffic going to the DMZ as well as the internal network. It's…

Contents