3.1.3 ‐ Network Segmentation - Zach-ATK/reading-notes GitHub Wiki
3. Network Segmentation:
Additional Sources
Classful Subnetting | VLANs and Trunking | CIDR Blocks |
Topic
These articles discuss basic networking principles, and how they interact to design and develop a local area network. In this case CIDR and Network Segmentation.
Prompts:
CIDR Block Notation Explained in 2 Minutes
1. What is CIDR notation? a CIDR block?
- CIDR (Classless Inter-Domain Routing) notation is a method of representing the CIDR Block of a network aka the IP addresses and their associated routing prefix.
- A CIDR block refers to a range of IP addresses specified using CIDR notation. It consists of an IP address and a prefix length.
2. How many octets are found in an IPv4 address?
- four octets.
3. Setting binary aside and using the decimal system, what is the range of numbers found in an octet?
- 0 to 255.
4. What does the final digit after the “/” represent in an IPv4 address?
- subnet mask
5. How many IP addresses are in the CIDR block 10.0.0.0/24?
- 256
What Is Network Segmentation and Why It Matters?
1. In your own words, describe network segmentation.
- Network segmentation is the practice of dividing a computer network into distinct segments or zones using devices like firewalls, switches, and routers. By doing so, different parts of the network are isolated from each other, enhancing security, restricting access and minimizing security issues.
2. Network segmentation isn’t important as long as the network is using a well configured firewall. Do you agree? Why or why not?
- I do not agree that network segmentation is unnecessary if a network is using a well-configured firewall. Not only does segmentation help with internal attacks, but it also helps with network architecture.
3. What is a screened subnet?
- (AKA) a demilitarized zone (DMZ), is a network segment that acts as an intermediary zone between a trusted internal network and an untrusted external network, typically the internet.
4. Cameras, ID card scanners, locked doors and biometrics are just a few examples of what type of security?
- Physical security measures
Things I want to know more about:
- I feel very confident on this topic, so I have no known questions.