Lab 18: Network Security Architecture Review
Objectives
Step 1: Network Security Architecture Layers
Internet
│
▼ north-south traffic (external → internal)
┌─────────────────────────────────────────────┐
│ Perimeter Layer │
│ DDoS Protection → WAF → Firewall → DMZ │
└──────────────────┬──────────────────────────┘
│
┌──────────────────▼──────────────────────────┐
│ Core Network │
│ ┌───────────┐ ┌───────────┐ ┌─────────┐ │
│ │ Internet │ │ Corp │ │ DMZ │ │
│ │ Edge │ │ Network │ │ │ │
│ └───────────┘ └─────┬─────┘ └─────────┘ │
│ │ │
│ east-west (internal) │
│ ┌──────────────────────────────────────┐ │
│ │ Microsegmentation │ │
│ │ Finance│HR│Dev│PCI Zone│Server Zone │ │
│ └──────────────────────────────────────┘ │
└─────────────────────────────────────────────┘Direction
Description
Security Challenge
Step 2: Firewall Rule Conflict Detector
Step 3: Traffic Flow Analysis Methodology
Source
Data Provided
Step 4: Network Segmentation Design
Step 5: Firewall Ruleset Audit
Step 6: DMZ Architecture
Step 7: Zero Trust Network Segmentation
Step 8: Capstone — Network Architecture Review
Summary
Concept
Key Points
Last updated
