Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Network Architect's Handbook

You're reading from   Network Architect's Handbook An expert-led journey to building a successful career as a network architect

Arrow left icon
Product type Paperback
Published in Jan 2024
Publisher Packt
ISBN-13 9781837637836
Length 418 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Alim H. Alim H.
Author Profile Icon Alim H.
Alim H.
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. Part 1 – Navigating the Architectural Blueprint of Networking
2. Chapter 1: Understanding the Network Architect’s Role FREE CHAPTER 3. Chapter 2: Network Architect in an Organization 4. Chapter 3: Roadmap to Becoming a Network Architect 5. Part 2 – Crafting the Architectural Mind: Attributes and Mindset of a Network Architect
6. Chapter 4: Attributes of a Network Architect 7. Chapter 5: The Mindset of the Network Architect – the Principles of Design 8. Part 3 – Constructing the Core: Building Blocks of a Network Architect
9. Chapter 6: Foundations of Network Architecture – Part 1: Route/Switch 10. Chapter 7: The Foundation of Network Architecture, Part Two – Network Services 11. Chapter 8: Foundations of Network Automation 12. Chapter 9: Paradigm Shift to Cloud Computing 13. Part 4 – Mastering the Craft: Advancing Your Journey as a Network Architect
14. Chapter 10: Preparing for Certifications and Cracking the Job Interview 15. Chapter 11: The Skills to Become a Better Network Architect and Overcome Daily Challenges 16. Chapter 12: Additional Information and Recommended Books 17. Index 18. Other Books You May Enjoy

Understanding firewall rules

Firewall rules are another crucial component of network architecture, acting as the first line of defense (perimeter) in network security. Essentially, they are a set of guidelines that dictate how data packets are allowed to enter or leave a network. Network architects must be well-versed not only in understanding how firewall rules are applied on security devices but also in how they affect IT infrastructure, its distributed components, and end user’s/application’s capabilities to reach services.

Let’s consider an example.

We want to create two rules: allow HTTP traffic (port 80) from the internal network (192.168.1.0/24) to the internet while denying all other traffic, and block all SSH traffic from external sources to a specific server (for example, 192.168.1.10) within the internal network.

Figure 7.27 shows the configuration, as configured on a Palo Alto firewall appliance:

Figure 7.27 – Palo Alto firewall rules configuration

Figure 7.27 –...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime