EXERCISE
1. For each of the following:
- NAT
- DMZ
- Firewalls
2. Provide the description.
3. Discuss its purpose.
4. Identify how to implement it.
5. Explain why organizations need to implement it.
ANSWER
NAT
- Network Address Translation (NAT) is the process where a network device to assigns a public address to a computer inside a private network.
Purpose:
- To limit the number of public IP addresses an organization or company must use. for both economy and security purposes.
Implement:
- Able to keep track of the session composed of communication between the workstation and the firewall, and the firewall with the internet.
DMZ
- A physical or logical sub-network that separates an internal local area network (LAN) from other entrusted networks, usually the internet.
Purpose:
- It provides an additional layer of security to the LAN as it restricts the ability of hackers to directly access internal servers and data via the internet.
Implement:
- The external network is formed from the ISP to the firewall on the first network interface, the internal network is formed from the second network interface and the DMZ is formed from the third network interface. Different sets of firewall rules for traffic between the internet and the DMZ, the LAN and the DMZ, and the LAN and the internet tightly control which ports and types of traffic are allowed into the DMZ from the internet, limit connectivity to specific hosts in the internal network and prevent unrequested connections either to the internet or the internal LAN from the DMZ.
Firewalls
- It is a software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a network.
Purpose:
- Firewalls are incorporated into a wide variety of networked devices to filter traffic and lower the risk that malicious packets travelling over the public internet can impact the security of a private network. Firewalls may also be purchased as stand-alone software applications.
Implement:
- By using a host-based firewall, it installed on individual servers and monitors incoming and outgoing signals. A network-based firewall can be built into the cloud's infrastructure, or it can be a virtual firewall service.