CHAPTER 20
Hiding the Private Network
In each of the preceding chapters, security planning was presented as a three-level plan that incorporated different types and levels of security devices, techniques, and policies at each level. Internet security is no different. In this setting, the interior is the local user system or the organization’s local area network. Going forward, we will refer to these structures as private networks. In this chapter, you’ll learn to:
- Discuss the advantages and disadvantages of implementing Network Address Translation (NAT) and Port Address Translation (PAT) for network security.
- Define and describe network segmentation and security zones
- Use NAT to create security segments in the network
- Use VLANs to implement security zoning
Understanding Private Networks
After the interior has been secured using the proper devices, techniques, and policies described in the first three chapters, it is necessary to secure the inner perimeter, which...