Skip to content
crmnuggets
Menu
  • Home
  • CRM
    • SCRUM
    • ITIL 4
  • ABOUT
  • RCCG SOD
  • DEVOTION
  • PROJECT MANAGEMENT
  • MORE
    • RCCG SUNDAY SCHOOL TEACHERS
    • RCCG SUNDAY SCHOOL MANUAL
    • COMPUTER SECURITY
    • DIGITAL MARKETING
    • CYBER SECURITY
    • MFM 70 DAYS FASTING
    • BUSINESS ANALYSIS
    • BUSINESS CONTINUITY MANAGEMENT
    • KEDI HEALTHCARE
  • TERMS
  • PRIVACY
  • HIRE ME
Menu
Key Facts About Local Area Networks

Local Area Networks: What You Never Knew (+Examples)

Posted on April 26, 2023September 15, 2023 by Adeniyi Salau

A Local Area Network is a network infrastructure that spans a small geographical area. LANs have specific characteristics:

  • LANs interconnect end devices in a limited area such as a home, school, office building, or campus.
  • A LAN is usually administered by a single organization or individual. Administrative control is enforced at the network level and governs the security and access control policies.
  • LANs provide high-speed bandwidth to internal end devices and intermediary devices, as shown in the figure.
The diagram is an illustration of a LAN. At the centre of the diagram is a switch. There are four Ethernet connections on the switch. At the top left is a connection to a PC. Below that is a connection to the computer at the desk of a worker.
Below that is another connection to the computer at the desk of a worker. At the bottom left is a connection to an IP phone. To the right of the switch is a connection to a server. The text under the figure reads: a network serving a home, small building, or a small campus is considered a LAN.
A network serving a home, small building, or a small campus is considered a LAN.
WANs
The figure shows a WAN which interconnects two LANs. A WAN is a network infrastructure that spans a wide geographical area. WANs are typically managed by service providers (SPs) or Internet Service Providers (ISPs).
WANs have specific characteristics:
  • WANs interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents.
  • WANs are usually administered by multiple service providers.
  • WANs typically provide slower speed links between LANs.
The figure shows two branch LANs connected via a WAN link. Both LANs are highlighted in a light yellow box and consist of a central switch connected to three PCs, an IP phone, a server, and a router. The two routers are connected via a red WAN link. On the left is the branch 1 LAN and on the right is branch 2 LAN.

Zone-Based Policy Firewall

Zone-based policy firewalls (ZPFs) use the concept of zones to provide additional flexibility. A zone is a group of one or more interfaces that have similar functions or features. Zones help you specify where a Cisco IOS firewall rule or policy should be applied.
In the figure, security policies for LAN 1 and LAN 2 are similar and can be grouped into a zone for firewall configurations. By default, the traffic between interfaces in the same zone is not subject to any policy and passes freely. However, all zone-to-zone traffic is blocked. In order to permit traffic between zones, a policy allowing or inspecting traffic must be configured.
The only exception to this default deny any policy is the router self zone. The self zone is the router itself and includes all the router interface IP addresses. Policy configurations that include the self zone would apply to traffic destined to and sourced from the router. By default, there is no policy for this type of traffic. Traffic that should be considered when designing a policy for the self zone includes management plane and control plane traffic, such as SSH, SNMP, and routing protocols.

Common Security Architectures

Firewall design is primarily about device interfaces permitting or denying traffic based on the source, the destination, and the type of traffic. Some designs are as simple as designating an outside network and inside network, which are determined by two interfaces on a firewall.
Here are three common firewall designs.
Private and Public
Demilitarized Zone
Zone-Based Policy Firewalls
As shown in the figure, the public network (or outside network) is untrusted, and the private network (or inside network) is trusted.
Typically, a firewall with two interfaces is configured as follows:

  • Traffic originating from the private network is permitted and inspected as it travels toward the public network. Inspected traffic returning from the public network and associated with traffic that originated from the private network is permitted.
  • Traffic originating from the public network and travelling to the private network is generally blocked.
The private and public figure shows a cloud within a circle labelled public (untrusted). The cloud connects to a firewall via s 0 / 0 / 0. The g 0 / 0 firewall port connects to a circled labelled VLAN 1 private (trusted) that has a server and two pc’s on it. There is an arrow going from the private circle to the public circle with h t t p, SMTP, and d n s on it. There is another arrow going from the public circle to the private circle with the words no access.
Action Point

PS: I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you could drop your comment. Thanks in anticipation.

Fact Check Policy

CRMNuggets is committed to fact-checking in a fair, transparent and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.

 

Become Part Of our Fan Base on Facebook. Click Here.
Follow Us on Twitter. Click Here.
Many Crypto. One place. Use Roqqu

Hi, I now use RavenBank to send, receive and save money. I also pay my bills with ease, you should try it out too

 

DOWNLOAD RCCG SOD YEAR 1 TO YEAR 10 MANUAL

 Provided by SendPulse

OUR MISSION

To create well-reached contents that will increase the intellectual prowess of our readers. 

OUR VISION

To become a reference point in the blogging space by the year 2030. We want to be among the first 30 blogs in Nigeria. 

Official Social Media Pages for crmnuggets.com

To Get Email Updates when we post new contents, Click Here.

 Join Our Telegram Channel: CRMNUGGETSTwitter: @crmngr
​Facebook Group: @AdeniyiSalauFacebook Page: CRMNuggets
Instagram: @crmnigeriablog
Pinterest: CRMNUGGETS

Threads@crmnuggets

Tiktok: CRMNUGGETS

Fact Check Policy
Contact Us
Sharing Is Caring. If you enjoy this article, help us share with others.

DOWNLOAD 10 DIGITAL MARKETING EBOOKS FOR FREE

 Provided by SendPulse
truehost

Related Posts:

  • Understanding MAC Addresses And IP Addresses
    MAC Addresses And IP Addresses: Highlighting The Facts
  • Understanding Network Representation For Networks
    Understanding Network Representation For Networks
  • Understanding Network Communications Protocols For Cyber Security
    Network Communications Protocols For Cyber Security:…
  • Understanding Data Encapsulation In Networking
    Data Encapsulation In Networking: Highlighting The Facts
  • Understanding Antimalware Protection In Cybersecurity
    Antimalware Protection In Cybersecurity: Facts To Note
  • 12 Powerful SEO Techniques For 2023
    12 Powerful SEO Techniques For 2023 (+Examples)

Powered by Contextual Related Posts

Post navigation

← The Three-Layer Network Design Model: An Analysis (+Examples)
Ways Of Securing Email Accounts: How To Protect Your Gmail Account →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

SEARCH THROUGH OUR BLOG

NAVIGATE HERE

TRENDING

  • Understanding MAC Addresses And IP Addresses
    MAC Addresses And IP Addresses: Highlighting The Facts
  • Understanding Network Representation For Networks
    Understanding Network Representation For Networks
  • Understanding Network Communications Protocols For Cyber Security
    Network Communications Protocols For Cyber Security:…
  • Understanding Data Encapsulation In Networking
    Data Encapsulation In Networking: Highlighting The Facts
  • Understanding Antimalware Protection In Cybersecurity
    Antimalware Protection In Cybersecurity: Facts To Note
  • 12 Powerful SEO Techniques For 2023
    12 Powerful SEO Techniques For 2023 (+Examples)
  • Series 12: Latest CAPM Questions And Answers
    Series 12: Latest CAPM Questions And Answers
  • Health Benefits Of Vigor Essentials Capsule
    Series 6: Latest CAPM Questions And Answers
  • CAPM Questions
    Series 14: Latest CAPM Questions And Answers
  • Some Facts To Know Virtual LANs Generally
    Some Facts To Know Virtual LANs Generally

Powered by Contextual Related Posts

CHECK THIS

© 2025 CRMNUGGETS | Powered by Minimalist Blog WordPress Theme