answersLogoWhite

0

Yes, if you separate the network into different sub-networks, you can then set up rules (for example, through ACLs) that allow certain traffic between subnets, and block other types of traffic.

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

What network devices is used to create physical subnets?

routers


Which command is used to advertise the network 150.12.32.0?

To configure EIGRP to advertise specific subnets only, use the "wild card mask" option with the network command.


The administrator of a branch office receives an IPv6 prefix of 2001db8300052 from the corporate network manager. How many subnets can the administrator create?

The IPv6 prefix 2001:db8:3000:52::/64 indicates that the first 64 bits are used for the network portion. With a /64 subnet, the administrator can create 2^(128-64) = 2^64 subnets, which equals 18,446,744,073,709,551,616 possible subnets. Thus, the administrator has an enormous number of subnets available to allocate.


What is the differce between subnet and wide area network?

Subnets are designed for local area networks (LANS) that are used in an organization or building. Wide area networks cover larger areas and don't use subnets.


Which subnet mask should be used for a class B network that is divided into subnets that will accommodate between 800 hosts and 1000 hosts?

255.255.252.0


Which subnet mask should be used for a Class B network that is divided into subnets and will accommodate between 800 hosts and 1000 hosts?

255.255.252.0


What makes one an ethical hacker?

An ethical hacker is someone who attacks the security systems of a computer and network with the consent of its owners. Ethical hackers are used to test the security of a system and seek ways to improve it.


Is DES algoritgim a Network Security?

Yes, DES can be used for network security, but it is a rather weak one that can be cracked easily.


What does a business network security do?

Business network security is used to prevent and monitor unauthorized accesses to the network and any misuse or modification. It will also impose password security, firewalls, antivirus software, a network analyzer and more.


What is a CSS network used for?

A CSS (Cluster Switch System) network is used to simplify the network architecture and improve network efficiency. It is used to correct the inefficiencies of the standard Ethernet network.


How is networking security used?

Networking security is used to protect a series of computers connected to a specific network by scrambling the data passed between the network. This renders the data useless outside the network and secure.


What server role is used to manage security tokens and security services for a web based network?

Active Directory Federation Services is used to manage security tokens and security services on a Windows Server 2008 Web-based network.