What is a Network Appliance

Share This Post:

Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn
network-is-down-doesnt-know-why

A network appliance is a device you add to the network to provide additional functionality and extensibility

Load Balancer

  • Distributes work load across several devices.
    • DNS Round Robin
    • HTTP Round Robin
  • Load balancers transparent to the end users if working properly
  • Algorithms to distribute
    • Round robin,
    • Least response time,
    • Weighted round robin
  • Load balancers may also do:
    • DoS attack protection
    • Caching
      Etc

Proxy Server

  • Acts as an intermediary between our computer and the internet.  Usually sits behind the router.  Can also be a third party VPN on the other side of the router
  • Adds a layer of privacy and disguises our true endpoint
  • Content filtering
  • Caching

Content Filter

  • Blocks certain traffic and access to websites based on rules.
  • Traffic must flow through a content filter, it cannot sit on the edge of a network for it to work.
  • Can evaluate traffic based on:
    • URL
    • keywords
    • website categories
    • ports/protocols
  • Can be used as parental control/productivity devices/security
  • Hardware/software/cloud based

VPN Concentrator

Allows for a connection to our internal network through a VPN.  Essential an intranet services over the internet

  1. End users initiate VPN client.
  2. Connect to public Internet,
  3. Encrypted tunnel to concentrator.
  4. Concentrator authenticates

Provides encryption so that all data that traverses the internet is now private

Prevents exposing remote access server to the internet.   When data enters our office, it hits the router first.   IF we just let public traffic come in to connect to the remote access server, anyone can attempt to break into it.  A concentrator creates a demilitarized zone.  

You can also use the concentrator to surf the web through an encrypted channel.

Share This Post:

Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn

Leave a Reply

Your email address will not be published. Required fields are marked *

Table of Contents

You May Like

Related Posts

Security
ComputerGeek

How to Make Linux More Secure

Regardless of where you are in the cybersecurity world, network administrator, security analyst or hacker/penetration tester, learning how to make linux more secure is fundamental

Read More »
Linux Basics
Linux Administrator

Linux Kernel Module Management

Linux kernel module management is the process of adding and removing kernel functionality as needed.  A Linux kernel module is a self-contained driver library file. 

Read More »