Summary
In this chapter, we have learned about network topologies and their impact on our ability to implement access control and threat prevention in the infrastructure. We have examined several examples of typical topologies and have learned about the importance of network segmentation. We have also learned about firewalls in core and perimeter segments. Additionally, we learned how to approach the sizing of new appliances for our infrastructure and how to determine the load on the appliances that we may have to manage.
Now that we understand the goals of network segmentation and its impact on the design and security of different network topologies and their segments, in the next chapter, we are going to start building our first Check Point lab environment and learn about the Gaia operating system.