You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
Networks are built from a variety of physical and virtual devices, each serving a specific purpose. Understanding these devices and how they are arranged in a network architecture is essential for designing reliable, scalable, and secure networks.
A firewall filters traffic based on predefined rules to protect a network:
| Type | Description |
|---|---|
| Packet filter | Examines individual packets (source/destination IP, port, protocol) |
| Stateful firewall | Tracks the state of connections and makes decisions based on context |
| Next-gen firewall (NGFW) | Deep packet inspection, application awareness, intrusion prevention |
| Web application firewall (WAF) | Protects web apps from attacks like SQL injection and XSS |
| Device | Name | Function |
|---|---|---|
| IDS | Intrusion Detection System | Monitors traffic and alerts on suspicious activity |
| IPS | Intrusion Prevention System | Monitors traffic and blocks suspicious activity inline |
Distributes incoming traffic across multiple servers to ensure availability and performance:
| Algorithm | Description |
|---|---|
| Round robin | Distributes requests evenly in sequence |
| Least connections | Sends traffic to the server with the fewest active connections |
| IP hash | Routes requests from the same IP to the same server |
| Weighted | Assigns more traffic to more powerful servers |
| Type | Description |
|---|---|
| Forward proxy | Sits between clients and the internet; filters and caches requests |
| Reverse proxy | Sits in front of servers; load balances, caches, and provides SSL termination |
The traditional enterprise network design:
┌─────────────────────────────────┐
│ Core Layer │
│ High-speed backbone routing │
│ (Core routers / L3 switches) │
├─────────────────────────────────┤
│ Distribution Layer │
│ Policy, ACLs, VLAN routing │
│ (L3 switches / routers) │
├─────────────────────────────────┤
│ Access Layer │
│ End-user device connections │
│ (Switches, access points) │
└─────────────────────────────────┘
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.