Three well-known network security types

Network security involves-as the name suggests-securing the overall network. While security measures exist on individual computers and servers, the network has its own security issues. Access to the network is a primary source of concern. That’s because network access is how most hackers and other evildoers get into the network and ultimately do their dirty work. It would be ideal just to cut off network access, a concept that has been the basis for many a dry security joke. But we all know the reality is that an unplugged network would be useless for all of those legitimate users who need to get their work done. We recognize that there is an infinite array of configurations and architectures, so to keep it relatively simple we’ll stick to the basics. Let’s have a look at three well-known network access technologies that serve to balance the conflicting needs for access and security:

-Firewalls Conceptually, these are special routers or bridges that intercept, analyze, and apply security controls on the traffic between two or more networks. Commonly this will be between a “trusted” private network and “untrusted” public networks like the Internet or business partner networks.

-Virtual private networks (VPNs) Encryption of private networks operating over a public network (often the Internet) to protect the contents of the network traffic when moving across untrusted networks.

– Access devices Dedicated devices used to connect remote users to internetworks over the Internet and normal telephone lines. These products include access servers and access routers. Of the three technologies, only the firewall is solely concerned with enforcing application layer security, and it doesn’t provide access so much as permit it. The other two-VPNs and access servers-exist primarily to deliver trusted, cost-effective connectivity at the network layer. Access servers provide remote persons with a way to enter networks. The mission of a VPN is to securely encrypt network traffic as it traverses networks. A combination of access servers and VPN technology serves to allow controlled, secure, network access for an increasingly distributed workforce, and to support customer and business partners who could be coming from the other side of the planet. The solution should ensure that only authorized users are allowed access, while also ensuring data integrity across networks.

FIREWALLS

In the most common deployment scenario, a firewall serves as a traffic control point between a private “trusted” network and one or more public networks. It’s a gateway that selectively decides what may enter or leave a given network. To do this, a firewall must be the sole gateway between the network it protects and the outside. If traffic can go around a firewall, the security it provides is worthless. A basic principle is that all inbound and outbound traffic must pass through the firewall.

VIRTUAL PRIVATE NETWORKS

What is a virtual private network (VPN)? As so often happens in the computer business, marketing hype can muddle an otherwise clear term. In the case of VPNs, some confusion exists over what’s virtual in a VPN-the privacy or the network? Here’s the twopart definition of a virtual private network:

-VPN topology runs mostly over shared network infrastructure, usually the internet using by having vpn on windows vps, and has at least one private LAN segment at each endpoint.
-VPN sessions run through an encrypted connection.

ACCESS DEVICES

Access to your network can be accomplished through a variety of means. Branch offices, small offices, telecommuters, and road warriors may need higher performance and more robust access to the network. As such, access for these connections can be facilitated via access routers, specialized remote access gateways, and firewalls supporting user-based VPN connections.

Visit VpsWebServer and learn all about vps hosting and dedicated hosting

Processing your request, Please wait....