1.5. The Network
The best way to learn is by example; to that end this section presents a typical corporate network for a 100-person company. This network is fairly insecure. Forging ahead, various chapters in the book will capitalize on the vulnerabilities in the network and demonstrate ways to correct them. Of course, there is no one correct security model. Security needs vary from company to company, but showing how to spot and correct weaknesses in corporate security helps administrators find holes in their own networks, and helps create better methods for dealing with security issues.
NOTE
In this example, the netblock 10.10.0.0 255.255.255.0 is used. This is one of the netblocks that has been reserved by RFC 1918 for private use. Think ...
Get The Practice of Network Security: Deployment Strategies for Production Environments now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.