< Network Plus Certification < Security
Objective 6.1: Explain the function of hardware and software security devices
Network-based firewall
Network based firewalls – monitor traffic on the entire network segment, meaning an administrator monitors and controls firewall services from a central location.
Host-based firewall
Host based firewalls – is installed on an individual system and monitors and controls inbound and outbound traffic for just that system.
IDS (Intrusion Detection System)
IPS (Intrusion Prevention System)
VPN (Virtual Private Network) concentrator
VPN concentrators increase remote access security. Concentrators sit between the VPN client and VPN server, creating a tunnel authenticating users and encrypting data as it travels. They also regulate and monitor data transfer across the tunnel, and control inbound and outbound traffic as an endpoint or router.
This article is issued from
Wikibooks.
The text is licensed under Creative
Commons - Attribution - Sharealike.
Additional terms may apply for the media files.