- Implementing Cisco Networking Solutions
- Harpreet Singh
- 346字
- 2021-07-08 10:02:28
Internet edge
The internet is probably the biggest network that one can imagine today. It shouldn't be a surprise then that most IT networks are connected to the internet. There are exceptions to this in case of military networks, and networks that are totally isolated, but this is true in general for organizational IT networks. Even if organizations do not allow internet browsing, connectivity to the internet is required for connectivity of the mail servers.
We are living in an age where the internet is full of security threats to the IT infrastructure. These threats range from infecting machines with viruses and worms to more sophisticated attacks such as ransomware attacks to extort money from organizations. Hence, it is critical that the organizations protect themselves from the internet to prevent any loss to business continuity.
Most organizations centralize the internet access for their employees at a limited number of locations, to provide better control over the traffic and provide better security from the internet. This also helps the organization to manage costs in a more effective manner and gain more visibility into the utilization of the internet bandwidth.
The main functions performed at the internet edge are as follows:
- Providing connectivity to the internet for services such as email and web browsing
- Managing redundant links from internet service providers and ensuring the optimal utilization of the links
- Securing the network infrastructure from any attacks from the internet
- Providing an infrastructure for remote access to the corporate network infrastructure in line with the organization's policies
- Hiding the internal IP addresses from the internet and doing Network Address Translation (NAT) for connecting to the public internet
- Providing information about the internet bandwidth utilization and the type of traffic being carried in the internet links
- Implementing any security controls to block certain types of traffic or websites aligned to the organization's security policy
Most of these functions are performed as a separate segmented zone within the data center. We will discuss the implementation of the aforementioned functions on the internet edge in Chapter 7, Understanding and configuring DC technologies.
- 演進式架構(原書第2版)
- C#高級編程(第10版) C# 6 & .NET Core 1.0 (.NET開發經典名著)
- Android應用程序開發與典型案例
- Java面向對象程序開發及實戰
- Python編程完全入門教程
- Learning JavaScript Data Structures and Algorithms
- 微信小程序全棧開發技術與實戰(微課版)
- Web前端應用開發技術
- .NET 4.0面向對象編程漫談:應用篇
- 現代CPU性能分析與優化
- 從零開始學UI:概念解析、實戰提高、突破規則
- Drupal 8 Development Cookbook(Second Edition)
- C語言程序設計
- Hands-On Data Visualization with Bokeh
- C#開發之道