Chapter 3

Locking down the infrastructure: Internet, Wi-Fi, wired, VPN, WAN, and the core

Abstract

Locking down the network becomes a critical element of security. Here, we subdivide the network into security zones and implement concepts of limited internal trust. Then, practical examples of locking down core network elements are presented. The end objective to emphasize a secure network begins with subdivided security zones with secure switching, routing, and access control.

Keywords

Wi-Fi security
router security
security zones
authentication
security trusts
When we think about network security and performance, we generally focus on the edge, including client hosts, servers, firewalls connecting the Internet to the LAN/WAN domains. Classically, ...

Get Network Performance and Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.