Enterprise Neetwok Fundamentals
Enterprise Neetwok Fundamentals
• This includes routers, switches, access points, and firewalls that connect all
devices.
• It ensures smooth data transfer between computers, servers, and the internet.
b) Network Devices
c) Network Protocols
• Securely connects remote users to the company network over the internet.
• Helps employees work from anywhere safely.
ERP stands for Enterprise Resource Planning. It is a software system that helps
businesses manage and automate their core processes in one place.
ERP integrates all business processes into one system, making operations smoother and more
efficient!
• SAP ERP
• Oracle ERP
• Microsoft Dynamics 365
Attack Surface
The attack surface is the total number of possible entry points where an attacker can try
to gain unauthorized access to a system, network, or application.
Managing enterprise technology means handling all the IT systems, software, and networks
that help a business run smoothly.
Typical Enterprise Network Zoning
Enterprise networks are divided into different zones for security, efficiency, and
management. Each zone serves a specific purpose and ensures that sensitive data is
protected while allowing necessary communication.
1. Internet Zone 🌍
• The outside world where users, customers, and threats exist.
• Everything outside the company’s private network, including websites, cloud
services, and external users.
• Risk Level: High – vulnerable to hacking, malware, and cyberattacks.
• Protection Methods: Firewalls, encryption, intrusion prevention systems (IPS).
4. Honeypot Zone 🎭
• A trap set up to attract hackers and study their attacks.
• Contains fake data that appears valuable but has no real business use.
• Risk Level: Intentional – designed to lure attackers.
• Protection Methods: Strict isolation, monitoring tools.
5. VPN Zone (Virtual Private Network) 🔒
• Securely connects remote users to the enterprise network.
• Encrypts internet traffic, making it unreadable to hackers.
• Risk Level: Low – only as secure as the users' devices.
• Protection Methods: Multi-factor authentication (MFA), strong encryption,
monitoring.
6. Intranet Zone 🏢
• The private network for employees only.
• Stores internal applications, databases, and communication tools.
• Risk Level: Low – access is controlled.
• Protection Methods: Role-based access control (RBAC), firewalls, monitoring.
7. Extranet Zone 🤝
• A shared network for business partners, vendors, and suppliers.
• Allows controlled access to specific enterprise data.
• Risk Level: Medium – external users have access, but with restrictions.
• Protection Methods: Access controls, VPN, monitoring.
Routers are essential devices in enterprise networks that manage data traffic, enhance
security, and ensure smooth communication between different network segments. They
work with various protocols, subnets, and subnetworks to optimize performance and
scalability.
➡️ Routing Protocols:
• OSPF (Open Shortest Path First) – Used for dynamic routing in large enterprise
networks.
• BGP (Border Gateway Protocol) – Manages data flow between different ISPs and
global networks.
• EIGRP (Enhanced Interior Gateway Routing Protocol) – Cisco’s proprietary
protocol for better efficiency.
• IPv4 (e.g., 192.168.1.1) and IPv6 (e.g., 2001:db8::1) for device identification.
• Routers handle public and private IP addressing using Network Address
Translation (NAT).
4. Security and Firewall Protection 🔒
• Routers filter traffic using Access Control Lists (ACLs) to block unauthorized
access.
• Firewalls and Intrusion Detection Systems (IDS/IPS) help protect against cyber
threats.
• VPN (Virtual Private Network) support ensures secure remote access.
Enterprise networks use different types of servers to manage various functions, ensuring
efficiency, security, and smooth communication. Here’s a breakdown of the key server
types:
1. Web Servers 🌐
• Function: Hosts websites and web applications.
• Example Software: Apache, Nginx, Microsoft IIS.
• Usage: Handles HTTP/HTTPS requests, delivers web pages, and manages dynamic
content.
2. Database Servers 🗄️
• Function: Stores and manages structured data for applications.
• Example Software: MySQL, PostgreSQL, Microsoft SQL Server, Oracle DB.
• Usage: Supports web apps, ERP systems, analytics, and data storage.
3. File Servers 📂
• Function: Centralized storage for sharing files across the network.
• Example Software: Windows Server (File Services), Samba, NAS/SAN systems.
• Usage: Allows users to store, access, and collaborate on files securely.
4. Mail Servers 📧
• Function: Manages sending, receiving, and storing emails.
• Example Software: Microsoft Exchange, Postfix, Zimbra, Sendmail.
• Usage: Ensures business email communication and supports IMAP/SMTP/POP3
protocols.
7. Virtualization Servers 🖥️
• Function: Hosts multiple virtual machines (VMs) on a single physical server.
• Example Software: VMware ESXi, Microsoft Hyper-V, KVM, Proxmox.
• Usage: Reduces hardware costs, improves scalability, and supports cloud
computing.
Enterprise networks require strong security defenses to protect against cyber threats.
Three key components in enterprise network security are Firewalls, Web Application
Firewalls (WAF), and Monitoring & Detection systems. Let’s break them down:
1. Role of Firewalls 🔥
A firewall acts as a barrier between a trusted network (enterprise) and an untrusted
network (internet). It monitors and controls incoming and outgoing traffic based on
security rules.
Types of Firewalls:
✅ Network Firewalls – Protects entire networks by filtering traffic at the network level.
✅ Host-Based Firewalls – Installed on individual devices for added security.
✅ Next-Generation Firewalls (NGFWs) – Combines traditional firewall functions with
deep packet inspection, intrusion prevention, and application control.
Firewall Functions:
🔹 Example Firewalls: Cisco ASA, Palo Alto, Fortinet, pfSense, Check Point.
2. Role of Web Application Firewalls (WAF) 🌐🔥
A Web Application Firewall (WAF) is designed to protect web applications from attacks
like SQL injection, Cross-Site Scripting (XSS), and API abuse.
• Collects, analyzes, and correlates security logs from firewalls, servers, and
endpoints.
• Helps detect advanced threats and suspicious behavior.
• Example: Splunk, IBM QRadar, Microsoft Sentinel, ELK Stack.
Limitations:
Limitations:
❌ Can become slow under heavy traffic.
❌ Less efficient for large-scale databases.
Limitations:
Limitations:
Limitations:
Comparison Table 🏆
Storage Type Access Best for Pros Cons
Fast, scalable,
High-speed Enterprise databases, Expensive, complex
SAN supports large
network cloud setup
applications