CCNA 1 - Chapter 1
used to further filter access and traffic forwarding.
Access control lists (ACL)
These are used to provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.
Dedicated firewall systems
private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization.
Intranet
used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
Intrusion prevention systems (IPS)
A network infrastructure designed to support file servers and provide data storage, retrieval, and replication.
Storage Area Network (SAN)
timely and reliable access to data
availability
only intended person can access
confidential
networks capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
converging network
characteristics of a good network
fault tolerance scalability QoS Security
assurance that data has not been altered
integrity
fault tolerance
limits impact and offers quick recovery
networking that uses existing electrical wiring to connect devices,
powerline networking
extranet
secure and safe access to individuals who work for a different organization, but require access to the organization's data.