Please enable JavaScript.
Coggle requires JavaScript to display documents.
Implement secure network designs - Coggle Diagram
Implement secure network designs
Network segmentation
DMZ
East-west traffic
Virtual local area network (VLAN)
Extranet
Zero Trust
Intranet
Load balancing
Scheduling
Virtual IP
Active/passive
Persistence
Active/active
Virtual private network (VPN)
Remote access vs. site-to-site
IPSec
Split tunnel vs. full tunnel
SSL/TLS
Always-on
Layer 2 tunneling protocol (L2TP)
HTML5
DNS
Network access control (NAC)
Agent and agentless
Port security
Loop prevention
Dynamic Host Configuration Protocol (DHCP) snooping
Bridge Protocol Data Unit (BPDU) guard
Media access control (MAC) filtering
Broadcast storm prevention
Out-of-band management
Network appliances
Proxy servers
Jump servers
HSM
Network-based intrusion detection system (NIDS)/network-based intrusion prevention system (NIPS)
Sensors
Aggregators
Collectors
Firewalls
Access control list (ACL)
Route security
Quality of service (QoS)
Implications of IPv6
Port spanning/port mirroring
Port taps
Monitoring services
File integrity monitors