Tami Smith Networking Fundamentals Professor Jeevan D’Souza December 10, 2018
Case Project 11-1: Border Locations
Create a document that explains network borders to the judges and the border points you plan to examine for security.
Establishing a filtering process that identifies and blocks cyber attacks is important when itcomes to networking traffic. A network boarder is imperative to the security of a network. One of the best uses of a network border is at the firewall and the Internet router.
The diagram below shows how the network border where the Internet router and firewall arebroken out to its separate devices. One of the primary focuses is on inbound traffic.It is important for the routers to do their primary job, pas traffic through.
There are some exceptions where security and traffic concerns might require basic blocking on the router.
https://www.solvedcollegepapers.com/product/cmit-130-40a-cmit130-40a-ctm
https://www.solvedcollegepapers.com/product/cmit-130-40a-cmit130-40a-ch2