A security zone is a logical structure that's created from one or more interfaces that apply the same security policies. Many firewalls predefine security zones, with the most common being LAN, VPN, DMZ, and WAN. A security zone applies security policies and access control policies.
Security devices, such as firewalls and intrusion detection and prevention devices, are either hardware or software. Security devices can be host-based or network-based. A host-based intrusion detection system is a HIDS and a network-based system is a NIDS.
An authentication protocol verifies the credentials that have been provided by a user are valid and serves as the first line of security defense for an open network. Authentication protocols are either PPP or AAA. The most common of the AAA protocols include Kerberos and IPSec. An IPSec policy defines rules and filters for specific...