- Implementing Cisco Networking Solutions
- Harpreet Singh
- 346字
- 2021-07-08 10:02:28
Internet edge
The internet is probably the biggest network that one can imagine today. It shouldn't be a surprise then that most IT networks are connected to the internet. There are exceptions to this in case of military networks, and networks that are totally isolated, but this is true in general for organizational IT networks. Even if organizations do not allow internet browsing, connectivity to the internet is required for connectivity of the mail servers.
We are living in an age where the internet is full of security threats to the IT infrastructure. These threats range from infecting machines with viruses and worms to more sophisticated attacks such as ransomware attacks to extort money from organizations. Hence, it is critical that the organizations protect themselves from the internet to prevent any loss to business continuity.
Most organizations centralize the internet access for their employees at a limited number of locations, to provide better control over the traffic and provide better security from the internet. This also helps the organization to manage costs in a more effective manner and gain more visibility into the utilization of the internet bandwidth.
The main functions performed at the internet edge are as follows:
- Providing connectivity to the internet for services such as email and web browsing
- Managing redundant links from internet service providers and ensuring the optimal utilization of the links
- Securing the network infrastructure from any attacks from the internet
- Providing an infrastructure for remote access to the corporate network infrastructure in line with the organization's policies
- Hiding the internal IP addresses from the internet and doing Network Address Translation (NAT) for connecting to the public internet
- Providing information about the internet bandwidth utilization and the type of traffic being carried in the internet links
- Implementing any security controls to block certain types of traffic or websites aligned to the organization's security policy
Most of these functions are performed as a separate segmented zone within the data center. We will discuss the implementation of the aforementioned functions on the internet edge in Chapter 7, Understanding and configuring DC technologies.
- Puppet 4 Essentials(Second Edition)
- 程序設計與實踐(VB.NET)
- Python網絡爬蟲從入門到實踐(第2版)
- Building Mobile Applications Using Kendo UI Mobile and ASP.NET Web API
- Oracle Database 12c Security Cookbook
- 數據結構案例教程(C/C++版)
- 移動增值應用開發技術導論
- 汽車人機交互界面整合設計
- Unity Character Animation with Mecanim
- Webpack實戰:入門、進階與調優(第2版)
- HTML5+CSS3+jQuery Mobile APP與移動網站設計從入門到精通
- Django Design Patterns and Best Practices
- Hack與HHVM權威指南
- Isomorphic Go
- PHP 7 Programming Blueprints