Securing the Network Infrastructure
8.01 Designing Secure Networks
8.02 Protecting Sensitive Data
8.03 Network Port Security
8.04 Implementing Firewalls
Planning the design of a secure network architecture is an ongoing task, as network requirements evolve over time. New technologies in network switches, firewalling, virtual private networks (VPNs), and threat mitigation present a need for periodic network security evaluations.
Network perimeter security can be achieved using hardware firewalls, proxy servers, network access control configurations, and VPNs. VPN solutions can require client-side VPN software or can be clientless, meaning existing common software such as a web browser ...