{"id":315,"date":"2020-08-18T19:23:47","date_gmt":"2020-08-18T20:23:47","guid":{"rendered":"http:\/\/www.linux-tutorial.info\/?page_id=77"},"modified":"2020-08-22T19:26:19","modified_gmt":"2020-08-22T20:26:19","slug":"this-is-the-page-title-toplevel-150","status":"publish","type":"page","link":"http:\/\/www.linux-tutorial.info\/?page_id=315","title":{"rendered":"Securing the Internal Network"},"content":{"rendered":"\n<title>Securing the Internal Network<\/title>\n<p>\nHow secure the internal <glossary>network<\/glossary>\nshould be is another issue that I have had &#8220;heated discussions&#8221; with my co-workers about. They\nargue that if we &#8220;make sure&#8221; that the <glossary>firewall<\/glossary> is secure, then we don&#8217;t need to worry about the\n<glossary>security<\/glossary> on the internal network. To me this is the same issue as locking the\nfront door, but writing the safe combination on the wall. Based on my own hacking experiences, I think that it is unwise to take anything for granted.\n<\/p>\n<p>\nHere again, you need to weigh <glossary>security<\/glossary>\nwith convenience. In most cases, the inconvenience of slightly slower connections or an extra two\nseconds to <glossary>login<\/glossary> is negligible compared to the damage cause by a malicious\nintruder. The best approach is to <glossary>address<\/glossary> those issues that we talked about\nearlier, including implementing the private <glossary>IP<\/glossary> address as defined in\n<glossary>RFC<\/glossary> 1918.\n<\/p>\n<p>\nIn addition, you should very much be considering implementing the same <glossary>security<\/glossary>\non the Internal machines as you would on your <glossary>gateway<\/glossary>. The reason is security. <i>If<\/i> any intruder breaks into the gateway and <i>if<\/i> they can then get into the  internal, how safe of the other machines. If you left holes open on the gateway, the\nodds are the holes are on the internal machines as well.\n<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Securing the Internal Network How secure the internal network should be is another issue that I have had &#8220;heated discussions&#8221; with my co-workers about. They argue that if we &#8220;make sure&#8221; that the firewall is secure, then we don&#8217;t need &hellip; <a href=\"http:\/\/www.linux-tutorial.info\/?page_id=315\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-315","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/www.linux-tutorial.info\/index.php?rest_route=\/wp\/v2\/pages\/315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.linux-tutorial.info\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.linux-tutorial.info\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.linux-tutorial.info\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.linux-tutorial.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=315"}],"version-history":[{"count":1,"href":"http:\/\/www.linux-tutorial.info\/index.php?rest_route=\/wp\/v2\/pages\/315\/revisions"}],"predecessor-version":[{"id":690,"href":"http:\/\/www.linux-tutorial.info\/index.php?rest_route=\/wp\/v2\/pages\/315\/revisions\/690"}],"wp:attachment":[{"href":"http:\/\/www.linux-tutorial.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}