CHAPTER 20Hiding the Private Network

In each of the preceding chapters, security planning was presented as a three-level plan that incorporated different types and levels of security devices, techniques, and policies at each level. Internet security is no different. In this setting, the interior is the local user system or the organization’s local area network. Going forward, we will refer to these structures as private networks. In this chapter, you’ll learn to:

  • Discuss the advantages and disadvantages of implementing Network Address Translation (NAT) and Port Address Translation (PAT) for network security.
  • Define and describe network segmentation and security zones
  • Use NAT to create security segments in the network
  • Use VLANs to implement ...

Get Cybersecurity Essentials now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.