answersLogoWhite

0

Yes, if you separate the network into different sub-networks, you can then set up rules (for example, through ACLs) that allow certain traffic between subnets, and block other types of traffic.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What network devices is used to create physical subnets?

routers


Which command is used to advertise the network 150.12.32.0?

To configure EIGRP to advertise specific subnets only, use the "wild card mask" option with the network command.


What is the differce between subnet and wide area network?

Subnets are designed for local area networks (LANS) that are used in an organization or building. Wide area networks cover larger areas and don't use subnets.


Which subnet mask should be used for a Class B network that is divided into subnets and will accommodate between 800 hosts and 1000 hosts?

255.255.252.0


Which subnet mask should be used for a class B network that is divided into subnets that will accommodate between 800 hosts and 1000 hosts?

255.255.252.0


What makes one an ethical hacker?

An ethical hacker is someone who attacks the security systems of a computer and network with the consent of its owners. Ethical hackers are used to test the security of a system and seek ways to improve it.


Is DES algoritgim a Network Security?

Yes, DES can be used for network security, but it is a rather weak one that can be cracked easily.


What does a business network security do?

Business network security is used to prevent and monitor unauthorized accesses to the network and any misuse or modification. It will also impose password security, firewalls, antivirus software, a network analyzer and more.


What is a CSS network used for?

A CSS (Cluster Switch System) network is used to simplify the network architecture and improve network efficiency. It is used to correct the inefficiencies of the standard Ethernet network.


How is networking security used?

Networking security is used to protect a series of computers connected to a specific network by scrambling the data passed between the network. This renders the data useless outside the network and secure.


What server role is used to manage security tokens and security services for a web based network?

Active Directory Federation Services is used to manage security tokens and security services on a Windows Server 2008 Web-based network.


The 2 security methods used on network?

There are two types of network security concerns: network infrastructure security and content security. Securing a network infrastructure includes the physical securing of devices that provide network connectivity and preventing unauthorized access to the management software that resides on them. Content security refers to protecting the information contained within the packets being transmitted over the network and the information stored on network attached devices.