官术网_书友最值得收藏!

Internet edge

The internet is probably the biggest network that one can imagine today. It shouldn't be a surprise then that most IT networks are connected to the internet. There are exceptions to this in case of military networks, and networks that are totally isolated, but this is true in general for organizational IT networks. Even if organizations do not allow internet browsing, connectivity to the internet is required for connectivity of the mail servers.

We are living in an age where the internet is full of security threats to the IT infrastructure. These threats range from infecting machines with viruses and worms to more sophisticated attacks such as ransomware attacks to extort money from organizations. Hence, it is critical that the organizations protect themselves from the internet to prevent any loss to business continuity.

Most organizations centralize the internet access for their employees at a limited number of locations, to provide better control over the traffic and provide better security from the internet. This also helps the organization to manage costs in a more effective manner and gain more visibility into the utilization of the internet bandwidth.

The main functions performed at the internet edge are as follows:

  • Providing connectivity to the internet for services such as email and web browsing
  • Managing redundant links from internet service providers and ensuring the optimal utilization of the links
  • Securing the network infrastructure from any attacks from the internet
  • Providing an infrastructure for remote access to the corporate network infrastructure in line with the organization's policies
  • Hiding the internal IP addresses from the internet and doing Network Address Translation (NAT) for connecting to the public internet
  • Providing information about the internet bandwidth utilization and the type of traffic being carried in the internet links
  • Implementing any security controls to block certain types of traffic or websites aligned to the organization's security policy

Most of these functions are performed as a separate segmented zone within the data center. We will discuss the implementation of the aforementioned functions on the internet edge in Chapter 7, Understanding and configuring DC technologies.

主站蜘蛛池模板: 兴山县| 乌兰浩特市| 中牟县| 大宁县| 麻城市| 集安市| 高安市| 夏津县| 河津市| 灵璧县| 黄梅县| 吉林市| 台北市| 石河子市| SHOW| SHOW| 海丰县| 平阴县| 慈溪市| 瑞安市| 佛山市| 方正县| 日土县| 马公市| 丰顺县| 民和| 远安县| 阿巴嘎旗| 平利县| 突泉县| 邹城市| 东丰县| 全州县| 西青区| 秭归县| 凤翔县| 绥滨县| 东兰县| 南昌县| 蓬安县| 德令哈市|