ABSTRACT

In this chapter, various technologies available to counter the threats and to protect workplaces are explained. It focuses more on technological solutions widely used to defend networks and computer systems. The effective protection of corporate networks demands its adequate configuration and management. To better safeguard an enterprise from possible external threats, these servers are generally separated from the main production network by placing them in the demilitarized zone (or DMZ) subnet. The production network (192.168.10.0/24) and DMZ (192.168.20.0/24) are given private subnet addresses and the firewall's interface connects to the Internet. Two different types of hardware virtualization are explained: server virtualization and network function virtualization. There are numerous network functions such as the firewall packet filtering, intrusion detection, packet switching and routing, network address translation, deep packet inspection, VPN tunneling, virus scanning, and spam filtering. The commercial cloud uses various service models to meet customer needs.