Understanding Cybersecurity: Network Segmentation

preview_player
Показать описание
In this video Travis discusses why network segmentation is used as well as some common practices for segmenting networks. He uses the example of a small to medium office environment where it would be good security practice to segment IOT devices. He presents the concept of VLANs as well as routing between segmented networks and why network segmentation makes this more difficult.

► Stay in touch!
Рекомендации по теме
Комментарии
Автор

One of the very most underrated channels here! Oh my God thank you very very much

Dalai
Автор

Thanks! This was a simple explanation that gave me just enough information to answer a lot of the questions I had about network segmentation using VLANs.

MrUnisteez
Автор

In Mr. Burns voice....EXXCEELLENT... Great video. I'm a suscriber & sharing 👍

techlife
Автор

This is great video! would you mind clarifying the use of VRF in a segmented network?

daizy
Автор

You are super cute ! The Humor makes it enjoyable to watch ❤

rozye
Автор

Appreciate this for for an office environment but just for anyone (like myself) looking for ways to segregate a home network, having a L2 Switch (VLAN capable) is not enough for looking to implement VLAN in this way - you need a router that supports VLAN's and nearly all consumer-level routers don't support this.

StuckInTheMddle
Автор

Thinking of 2 10gbe switches with Asus 89x router which has 2 10gbe ports. Not sure both can be used at the same time.

amigatommy
Автор

What gear do you use to draw? (hardware and software) Wacom?

techenthusiast
Автор

How do you test the VLAN is working accordingly?

SifuNuhai
Автор

Can I still do with if I want to segregate my wireless security cameras? - am I going to need 2 wireless routers then?

macster
Автор

The security concepts such as L2 segmentation, FW, ACL, router on a stick etc. are all fine. However, my impression is that you try to cover too much in this vlog and give the wrong impression to an especially novice user that these basic security techniques are the holly grails that will cure all security concerns.
Therefore I would rather start with a top-down analysis, highlight potential attack vectors and demonstrate which technique would be suitable to mitigate what concern. I.e. what you mention few times in your vlog as defense-in-depth

tamashalmai
join shbcf.ru