network architecture weaknesses
Cisco’s SAFE architecture
SAFE’s Places In the Network (PIN)
represents types of network locations, including campus networks, branch offices, data centers, and the cloud
email workflow
segment
segregation
hosts in one segment are restricted in the way they communicate with hosts in other segments
Ethernet network
network segments can be established physically by connecting all hosts in one segment to one switch and all the hosts in one segment to one switch and all the hosts in another segment to another switch
isolated segment
one that has no connectivity with other segments
air gapped
host or network segment that has no sort of physical connectivity with other hosts or networks is referred to as air gapped
virtualization
topology
zone
firewall
private network (intranet)
network of trusted hosts owned and controlled by organization
extranet
network of semi-trusted hosts, typically representing business partners, suppliers, or customers (hosts must authenticate to join extranet)
internet/guest
zone permitting anonymous access (or perhaps a mix of anonymous and authenticated access) by untrusted hosts over the Internet
Internet-facing
an Internet-facing host accepts inbound connections from and makes connections to hosts on the Internet
Demilitarized Zones (DMZs)
bastion hosts
differences between services designed to be accessible to a public Internet versus those for an extranet
subnet
three-legged firewall (or triple-homed)
screened host
zone types