Network segmentation is the process of dividing network traffic into subnetworks or segments. This way you can control network traffic and regulate access to network resources. Network segmentation also provides network security by keeping sensitive information separate from public domains, however it does not prevent intrusions.
Once network traffic is identified as specific protocols (TCP, UDP, DNS, HTTP) network segmentation can be used to allow network traffic through firewalls and other security mechanisms.
Network Security And Network Management
Network Segmentation is mostly associated with network security and network management. A network administrator can use network segmentation to control which network users have access to particular resources on the network. If a user only needs access to email, network segmentation can be used to allow network traffic from the user’s computer only to the network email server.
If a network consists of multiple network segments, network monitoring and control is easier with network segmentation. For example if a network consists of two network segments you can use VPN or some other secure connection scheme to connect them into one network.
Network Traffic Flow Boundaries
Network Segmentation is also used to create network traffic flow boundaries. Often network management tasks are performed on network devices inside network traffic flow boundaries. Once network traffic is separated into network segments network segmentation can be used to separate each network segment even further, resulting in multiple network segments on one physical network. Sometimes Network Segmentation is called V LAN network segregation.
Network segmentation is commonly used in network security to increase network security, network management and network traffic flow control. Network Segmentation can be performed on any kind of network using network switches or routers.Network Segmentation can be performed on network segments that consist of network switches or network routers.
VLAN Network Segregation
Network Segmentation is also known as VLAN network segregation and network traffic segregation. Network segmentation is widely used in network security and network management. Network Segmentation increases network security, network traffic flow control and network management by creating multiple isolated networks on one network infrastructure. Network Segmentation can be performed using network switches or network routers.
Network Segmentation is performed by separating network traffic into multiple network segments, allowing only specific network protocols through firewalls and other network security mechanisms. Network segmentation also makes it easier to separate different network management functions because the traffic flow boundaries are clearly defined.
Network Segmentation network traffic flow boundaries make network management tasks easier by clearly separating network management functions. Network monitors and network security tools can be placed inside network traffic flow boundaries to allow network administrators to monitor traffic on the network without infringing on user privacy.
The most common ways of performing network segmentation are using VLANs, VPN, network routers and network switches.
VLAN network segregation is a type of network segmentation that uses network switches to separate network traffic into network segments. VLANs (Virtual Local Area Networks) are created by assigning ports on network switches with specific VLAN ids, allowing only the specified network ids to pass through the switch. VLAN network segregation is often used to create network traffic flow boundaries inside network segments.
Network routers network segmentation is another way of network segregation that uses network routers to separate network traffic into network segments by matching IP addresses or protocols with access control lists (ACLs). Only the packets that match ACLs are allowed through the router, allowing only network protocols and network traffic to pass through network routers, creating network segments.
Charge Up Your Security: Protecting Your Electric Car from Hackers and Thieves
Guide to Vulnerability Management
Micro-Segmentation: The Future of Data Center Security