CHAPTER 21
Protecting the Perimeter
The second level you need to secure is the inner perimeter, where the private network meets the Internet. What defines a perimeter is the boundary where you have control, versus where you don’t have control. The perimeter is where your private network touches those individuals and companies with which you want to interact. In this chapter, you’ll learn to:
- Implement firewalls and other intrusion-prevention devices and structures
- Describe common enterprise-network structures, including intranets, extranets, DMZs, and honeypots
- Describe the purpose and limitations of firewalls
- Describe the use of honeypots as an intrusion-prevention technique
- Understand the role of DMZs (demilitarized zones) in cybersecurity topologies
- Explain the configuration and operation of a demilitarized zone (DMZ) host, including the key services contained within the zone
Understanding the Perimeter
The inner perimeter is the point where we want to stop the...