Network Security | Network Segmentation and Separation with VLANs

Network Security | Network Segmentation and Separation with VLANs

Virtual Private Networks (VPN), a VPN is managed by an access control list, the VPN is rule based. The access control list may be used to permit or block network traffic. There is also an implied deny meaning if the permit list does not include permit certain traffic, the traffic is automatically denied (Implicit Deny).

Adaptive Security Appliance (ASA): ASA is a security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. An ASA firewall provides proactive threat defense that stops attacks before they spread through the network.

Network Separation: On a switch all the ports belong to the same broadcast domain, broadcast domain is also known as a vLAN, a broadcast domain will also use one IP subnet domain.

We can use vLAN management to create different vLAN network on the same switch. One advantage of using vLANs on the same switch is we can apply quality of service (QoS)

Separation of the switch is done a layer 2 of the OSI model and on top of this each separate vLAN uses layer 3 of the OSI model to get a logical IP address.

We can use access control list to control access to vLANs. We can use sub-inferfaces to control traffic between vLAN interfaces.




Network Security | Network Segmentation and Separation with VLANs

Network Security | Network Segmentation and Separation with VLANs

Ransomware and The Role of Cryptocurrency

Ransomware and The Role of Cryptocurrency

Understanding Ransomware | Defending Against Ransomware

Understanding Ransomware and Defending Against Ransomware

How does ARP work? | ARP Commands

How does ARP work?, ARP Command

Kaseya Cyber Attack | Kaseya Ransomware Attack

About 200 US businesses have been hit by ransomware attack, according to a cyber-security firm.

Suggested Cyber Resilience Activity Plan

Suggested Cyber Resilience Activity Plan

Types of Cyber Security Threats

Types of Cyber Security Threats: Ransomware, Malware, Social engineering, Phishing

Guideline for setting secure Password

Guideline for setting secure Password. Choosing the right password

Reasons for Cyber Crime | Cyber Crime Security

There are many reasons which act as a catalyst in the growth of cyber crime.

Cyber Security Structure Attacks | Unstructured Attacks

The cyber attacks can also be classified as structure attacks and unstructured attacks based on the level of maturity of the attacker