Objective 6.1: Security Devices
Jump to navigation
Jump to search
Objective 6.1: Explain the function of hardware and software security devices
Network-based firewall[edit | edit source]
Network based firewalls – monitor traffic on the entire network segment, meaning an administrator monitors and controls firewall services from a central location.
Host-based firewall[edit | edit source]
Host based firewalls – is installed on an individual system and monitors and controls inbound and outbound traffic for just that system.
IDS (Intrusion Detection System)[edit | edit source]
IPS (Intrusion Prevention System)[edit | edit source]
VPN (Virtual Private Network) concentrator[edit | edit source]
VPN concentrators increase remote access security. Concentrators sit between the VPN client and VPN server, creating a tunnel authenticating users and encrypting data as it travels. They also regulate and monitor data transfer across the tunnel, and control inbound and outbound traffic as an endpoint or router.