Firewall Security Zones – Zone based Policy Firewall ZPF
We discuss Security Zones – Zone Policy Firewall (ZPF) in this video.
Firewall are there to secure our network (private network) from other networks (public network). Firewalls work on the basis of some rules or policies and these policies are applied to the interfaces of the router.
In security zones, multiple interfaces are combined in certain zones called security zones. Now the firewall policies or rules are applied to zones instead of individual interface of the router.
Sometime, we want to share some resources available in our private zone with the public zone network and in this case a third zone is created. This third zone is called demilitarized zone or DMZ.
#Firewall
#SecurityZones
#DMZ
#ZPF
Видео Firewall Security Zones – Zone based Policy Firewall ZPF канала GD Networking Newbie
Firewall are there to secure our network (private network) from other networks (public network). Firewalls work on the basis of some rules or policies and these policies are applied to the interfaces of the router.
In security zones, multiple interfaces are combined in certain zones called security zones. Now the firewall policies or rules are applied to zones instead of individual interface of the router.
Sometime, we want to share some resources available in our private zone with the public zone network and in this case a third zone is created. This third zone is called demilitarized zone or DMZ.
#Firewall
#SecurityZones
#DMZ
#ZPF
Видео Firewall Security Zones – Zone based Policy Firewall ZPF канала GD Networking Newbie
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
IPv6 Static default RoutePhysical Network Topologies: The FactsIPv6 EUI-64 Explained | SLAACCDP - Cisco Discovery Protocol Discussion and Demonstration using Packet TracerCryptology, Cryptography and Cryptoanalysis | Encryption and Decryption BasicsMetasploit Meterpreter – From theory to Practical DemonstrationNikto Web Scanner for Web Pentesting in a Virtual LabNetwork Address Translation (NAT) ExplainedAccess Control List ACL | Standard ACL | Extended ACL | Wildcard MaskDynamic Host Configuration Protocol DHCP in Cisco Packet TracerAWS Well Architected Framework - Operational Excellence PillarConfigure Static NAT Network Address Translation using Packet TracerIPv6 - MAC | Link layer Address Mapping | NDP NS NA BasicsAAA based Authentication - Local and Server based AuthenticationThree layer Hierarchical Network Model – Two tier and Three tier DesignEtherChannel Explained | Load balancing | ConvergenceISO 27001 ExplainedCisco IOS | Analysis of Show Interfaces Status command using Packet TracerMetasploit Tutorial Part 2Wireless Communication | Basic Characteristics of RF Signal | Amplitude, Frequency, PhaseSpanning Tree Protocol (STP) Port Roles and Port States in Packet Tracer