Summary
We have gained an understanding of security requirements, to ensure an appropriate, secure network architecture for a new or existing network. We have looked at solutions to provide the appropriate authentication and authorization controls.
We've studied how we can build security layers to allow access to information systems from trusted devices, outside of the enterprise network. You have seen a wide range of devices, including smartphones, laptops, tablets, and IoT devices, that must be secured on a network.
We have gained knowledge and an understanding of regulatory or industry compliance needs for strict network segmentation between processes and BUs
In this chapter, you have gained the following skills:
- Identification of the purpose of physical and virtual network and security devices
- Implementation of application- and protocol-aware technologies
- Planning for advanced network design
- Deploying the most appropriate network management and monitoring tools
- Advanced configuration of network devices
- Planning and implementing appropriate network security zones
These skills will be useful in the following chapters as we look to manage hybrid networks using cloud and virtual data centers.