0% found this document useful (0 votes)
46 views17 pages

Network Segmentation & Isolation Section PDF

Network segmentation involves breaking a large network into smaller segments to provide granular access control. This can be achieved using routers, virtual LANs (VLANs), perimeter networks like demilitarized zones (DMZs), and access control lists (ACLs). A DMZ is a securely separated perimeter network that allows untrusted users to access specific public services. VLANs create logical networks within a physical network to segment devices by role or need. Routers connect different networks and route traffic between them using IP addresses.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views17 pages

Network Segmentation & Isolation Section PDF

Network segmentation involves breaking a large network into smaller segments to provide granular access control. This can be achieved using routers, virtual LANs (VLANs), perimeter networks like demilitarized zones (DMZs), and access control lists (ACLs). A DMZ is a securely separated perimeter network that allows untrusted users to access specific public services. VLANs create logical networks within a physical network to segment devices by role or need. Routers connect different networks and route traffic between them using IP addresses.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Network Segmentation & Isolation Section

Introduction to Network Isolation

InstructorAlton.com
Network Segmentation & Isolation
• Network isolation, commonly referred to as network segmentation, is the
process of breaking a large network up into separate smaller network
segments.
• The goal is to be able to provide granular access control for each segment.
• We can accomplish this with:
o Routers
o Virtual LANs (VLANs)
o Perimeter Networks (DMZ, Extranet)
o Access Control Lists (ACLs)
o And Additional Measures…
Network Segmentation & Isolation Section

Demilitarized Zone (DMZ)

InstructorAlton.com
Demilitarized Zone (DMZ)
• A perimeter network designed to be
securely separated from an
organization’s private internal network
(intranet).
• Commonly called a DMZ (demilitarized
zone).
• Allows untrusted users outside an
organization’s LAN (intranet) to access
specific services located within the DMZ.
o Public Web Site(s)
o Trivial FTP Server for File Downloads
(drivers, software, etc.)
o Public Email Service (Gmail, etc.)
• Also blocks such users from gaining
access to the organization’s intranet.
Network Segmentation & Isolation Section

Basic Network Zones

InstructorAlton.com
Intranet, Extranet and the Internet
Network Segmentation & Isolation Section

Virtual LANs (VLANs)

InstructorAlton.com
Virtual LANs (VLANs)
• Essentially LANs within a LAN
o Physical Switch → Multiple Virtual Switches
• Break up a large “physical” LAN into several
smaller “logical” LANs.
• Accomplished with managed switches.
• Assign specific switch interfaces (ports) to
specific virtual LANs.
o Human Resource VLAN (Interfaces 1, 2, 3)
o Accounting VLAN (Interfaces 4, 5, 6)
• Benefits of VLANs
o Reduces Broadcast Domains
o Segments Network by Role
o Increases Security
o Devices Cannot Communicate with Other
VLANs
o Group Devices by Need, Not Physical Location
Network Segmentation & Isolation Section

Routers

InstructorAlton.com
Routers
• Used to Connect Different
Networks Together
• Routes Traffic Between Networks
using IP Addresses
• Uses Intelligent Decisions
(Routing Protocols) to Find the
Best Way to Get a Packet of
Information from One Network to
Another.
• OSI Layer 3 Device
o Layer 3 = Router
o Layer 2 = Switch
o Layer 1 = Hub
Network Segmentation & Isolation Section

Network Address Translation (NAT)

InstructorAlton.com
Network Address Translation (NAT)
• NAT translates private IP addresses to public IP addresses, allowing us to map
private IP addresses to public IP addresses:
o To help preserve scarce public IPv4 addresses
o To help increase network security
• With NAT, the private IP address of a network device is hidden from devices
outside of its LAN.
• Three are three forms of NAT:
o Static NAT (SNAT)
o Dynamic NAT (DNAT)
o Port Address Translation (PAT)
• Border network devices, such as routers, proxy servers, and firewalls can utilize
NAT.
Static NAT (SNAT)

• One-to-One relationship, where one private IP is statically configured to one


public IP address.
• Commonly used as a means to “hide” the IP address of a publicly available
device, such as a web server.
Dynamic NAT (DNAT)

• Many-to-Many relationship, where many private IP addresses have access to a


pool of public IP addresses.
• If the pool of IP addresses is all in-use, other devices in the local private network
must wait for them to become available.
Port Address Translation (PAT)

• Many-to-One relationship, where all devices on the local private network utilize
a single public IP Addresses.
• Ports are used to link each connection to a specific dynamic port number.
• Very common in small business and home networks.
Network Segmentation & Isolation Section

Access Control Lists (ACLs)

InstructorAlton.com
Access Control Lists (ACLs)
• Access Control Lists are a network
security feature used to create
allow/deny network rules to filter
network traffic.
• They can be set for both incoming
and outgoing traffic on a variety of
devices, such as:
o Routers
o Firewalls
o Proxy Servers
o End-Devices

You might also like