Objective 6.1: Security Devices
Objective 6.1: Explain the function of hardware and software security devices
Network-based firewall edit
Network based firewalls – monitor traffic on the entire network segment, meaning an administrator monitors and controls firewall services from a central location.
Host-based firewall edit
Host based firewalls – is installed on an individual system and monitors and controls inbound and outbound traffic for just that system.
IDS (Intrusion Detection System) edit
IPS (Intrusion Prevention System) edit
VPN (Virtual Private Network) concentrator edit
VPN concentrators increase remote access security. Concentrators sit between the VPN client and VPN server, creating a tunnel authenticating users and encrypting data as it travels. They also regulate and monitor data transfer across the tunnel, and control inbound and outbound traffic as an endpoint or router.