Learning Library

← Back to Library

Understanding Firewalls and Network Segmentation

Key Points

  • The episode shifts focus to network security, outlining core topics such as firewalls, segmentation, VPNs, and SASE while acknowledging the subject’s breadth.
  • Firewalls are likened to physical firewalls that contain a fire, providing isolation and protection to prevent threats from spreading across network segments.
  • A typical design places both an external, Internet‑facing firewall and an internal firewall to control traffic flow between users, web servers, and databases.
  • Firewalls perform packet filtering by examining header details—source/destination IP addresses and ports—and allow only legitimate traffic like HTTP (port 80) and HTTPS (port 443).
  • While segmentation and other advanced features will be discussed, the presenter notes that many additional network‑security concepts remain beyond the scope of this video.

Sections

Full Transcript

# Understanding Firewalls and Network Segmentation **Source:** [https://www.youtube.com/watch?v=sesacY7Xz3c](https://www.youtube.com/watch?v=sesacY7Xz3c) **Duration:** 00:27:26 ## Summary - The episode shifts focus to network security, outlining core topics such as firewalls, segmentation, VPNs, and SASE while acknowledging the subject’s breadth. - Firewalls are likened to physical firewalls that contain a fire, providing isolation and protection to prevent threats from spreading across network segments. - A typical design places both an external, Internet‑facing firewall and an internal firewall to control traffic flow between users, web servers, and databases. - Firewalls perform packet filtering by examining header details—source/destination IP addresses and ports—and allow only legitimate traffic like HTTP (port 80) and HTTPS (port 443). - While segmentation and other advanced features will be discussed, the presenter notes that many additional network‑security concepts remain beyond the scope of this video. ## Sections - [00:00:00](https://www.youtube.com/watch?v=sesacY7Xz3c&t=0s) **Understanding Firewalls in Network Security** - The speaker introduces the network segment of a cybersecurity series, using a physical‑firewall analogy to explain how firewalls create isolation and protect networks, while previewing related topics like segmentation, VPNs, and SASE. - [00:03:09](https://www.youtube.com/watch?v=sesacY7Xz3c&t=189s) **Layered Firewall Traffic Controls** - The speaker explains how two firewalls enforce strict source and destination address rules to block spoofed or unauthorized packets, ensuring external traffic must pass inspection before reaching the database. - [00:06:15](https://www.youtube.com/watch?v=sesacY7Xz3c&t=375s) **Proxy as Inspecting Man‑in‑the‑Middle** - The speaker explains how inserting a proxy creates two separate sessions that act as a controlled man‑in‑the‑middle, enabling traffic inspection, security policy enforcement, and privacy masking. - [00:09:18](https://www.youtube.com/watch?v=sesacY7Xz3c&t=558s) **NAT Translation and Network Protection** - The speaker explains how a NAT router/firewall maps many private devices to a single external IP, conserving addresses while preventing unsolicited inbound connections—a feature common in home routers—before transitioning to network segmentation. - [00:12:23](https://www.youtube.com/watch?v=sesacY7Xz3c&t=743s) **Tri‑Homed Firewall and Basic DMZ** - The speaker explains a tri‑homed firewall creating red, yellow, and green zones as a simple DMZ model, discusses its use in home networks, and notes its low cost but single‑point‑of‑failure drawback. - [00:15:27](https://www.youtube.com/watch?v=sesacY7Xz3c&t=927s) **Multi‑Tiered DMZ Architecture Overview** - The speaker explains a multi‑layered DMZ design that uses three firewalls to separate web, application, and database zones, highlighting its increased defense‑in‑depth, granular traffic controls, and higher cost and complexity before transitioning to a discussion of VPNs. - [00:18:37](https://www.youtube.com/watch?v=sesacY7Xz3c&t=1117s) **VPN Security and OSI Layering** - The speaker explains how different VPN types relate to the OSI model, highlighting that implementing encryption at lower layers secures traffic across all higher layers, though it isn’t always the best choice. - [00:21:41](https://www.youtube.com/watch?v=sesacY7Xz3c&t=1301s) **Broad vs Application-Specific VPN Trade‑offs** - The speaker compares simple, catch‑all network‑level VPNs with granular, app‑specific VPNs, highlighting their respective benefits and limitations, and then introduces SASE as a related zero‑trust concept. - [00:24:52](https://www.youtube.com/watch?v=sesacY7Xz3c&t=1492s) **SASE: Cloud‑Delivered Secure Edge** - The speaker explains SASE as a cloud‑based framework that fuses SD‑WAN, network security, and identity management to provide flexible, scalable networking and protection services directly at the network edge. ## Full Transcript
0:00Welcome back to the Cybersecurity Architecture Series. 0:03In the previous two videos, I talked about identity management and endpoint security, and now we're going to focus on the network. 0:11The network security involves a lot of different elements, and we're going to talk about each of these-- 0:16--about firewalls, which are a fundamental component of this, about segmentation, 0:20which we're able to do with using firewalls, about virtual private networks, about SASE. 0:26You'll hear more about that in a few minutes. 0:27And then, actually, the topic is so large and so mature, you really can't cover it all in this space. 0:32So there's going to be some things I'm not going to get a chance to talk about. 0:35But needless to say, there's a lot more that could be discussed here. 0:40So, first thing we're going to talk about are firewalls. 0:44So let's talk about what are we going to do with firewalls. 0:46The idea behind them in the first place where the technology and the notion even came from is in the physical world, a physical firewall. 0:53Let's say we've got three townhouses all connected. 0:56And this guy has a fire in his unit. 0:58Well, what we'd like is to have some way to limit the spread of that fire from one unit to the next. 1:04It might not make it completely go away, but it slows it down so that the fire department can get there and do something about it. 1:11So it's a way of creating isolation and protection from a dangerous event. 1:16So take that concept in mind and then apply it to a network scenario. 1:21Here we've got a user on a workstation hitting a web server, and that web server then goes against a database. 1:28The typical architecture we put in here is we add a firewall here and a firewall here. 1:33One that's Internet facing and one that is internal facing. 1:38And what we're going to do, the reason we're putting two of these here, we'll talk more about it in segmentation. 1:43But simply what we're going to do here, in the most basic form, is we're going to filter based upon certain things that are happening here. 1:51This is this notion of packet filtering. 1:54With packet filtering, I'm going to look into the packet, that is, the information that's being sent from this guy to this guy. 2:02And in that, he's going to include things like his source address, that is, the address that he's coming from, his destination address, 2:08where he wants it to go, which is going to be this web server 2:11and the port that he's going to use, which is a way of designating what kind of traffic it is. 2:16So this firewall can then filter based upon that information that's in the header of that packet. 2:22And he's going to look at and say, okay, port 80, that's the standard industry standard for unencrypted Internet traffic. 2:29So I'm going to allow that web traffic to come through on port 80, that we will allow. 2:34We will also allow encrypted traffic. 2:37So this is your SSL or now TLS encrypted web traffic. 2:42So I'm going to open this first firewall to allow that information to flow through. 2:47But I'm also going to add some more things to make it a little tighter. 2:51I'm going to say the source address has to be in the range of the external Internet. 2:57Why would we look at that? 2:58Well, I want to make sure that somebody isn't spoofing and acting like they're coming from inside. 3:03Sometimes we'll trust traffic that comes from the inside and give it more privileges and sort of drop our guard. 3:09We don't want that to happen from external traffic. 3:11So if this packet is literally coming from the outside and claims to be coming from the inside, we're going to block it. 3:17It's just going to be blocked right here. 3:19The destination address, we're going to say, where you can go is you must in fact only go there. 3:25If this guy tries to put any other address, like here, if he tries to go to the database directly, 3:30that will be blocked, because that destination address is not something we're going to allow through the first firewall. 3:36Now we have a second firewall here that's going to add even a little more security. 3:40It's going to say this is the traffic, this is the port we're going to open up to allow this kind of traffic between the web server and the database. 3:47We're going to allow a source address only of the web server. 3:51So I'm not going to allow anything that came from the Internet, the external world, if it's got that address as its source, 3:57where it started from, I'm not going to allow it. 3:59It has to have originated here and its destination can only be that. 4:06So what we've done in creating that set of rules is any traffic from the outside can only get to and must stop over here 4:14where it can be inspected and where we can implement some sort of security controls. 4:19It cannot get anywhere else. 4:20So that's what we're basically doing here, and you can keep applying these kinds of rules in order to tighten up your security. 4:27And what we're doing, what I've described here, is basically this idea of packet filtering where we're essentially just looking here at the packet 4:34that is, the first part of the packet, the header. 4:39So think of it as like an envelope. 4:41If I'm mailing a letter to you, what's going to be on the envelope? 4:44Well, we're going to have a to address and we're going to have a return address. 4:49This is your to address. 4:50This is your return address. 4:51So that's what we've basically done here. 4:54But we have not looked inside. 4:56So there's no inspection, here. 5:00But in this next example, I'm going to talk about stateful packet inspection. 5:04Where in this case, we're going to look not only at the packet, 5:08but we may also go ahead and look at the full thing, look at what's in the payload as well. 5:14And there are other things like application firewalls that are specific and they'll do even more inspection of this payload. 5:19That is the data that you're actually sending and make sure that it's not going to do harm to us. 5:25And in this case, it's more like the open envelope so that we're able to see the contents, 5:31not only the to and the from, but we can also see the contents as well. 5:35So that's an analogy to help you understand what this is. 5:38Stateful packet inspection also looks at the context of the packet. 5:42So it's looking at you sent one of these, and then one of these, but you should never have sent that next thing because that breaks all the rules. 5:49So it can look at more than just individual packets in isolation, which is what packet filtering does. 5:55This was sort of our first generation of firewalling, and then it got more sophisticated when we added stateful packet inspection. 6:02But there are other things here as well in this sort of firewall and technologies. 6:07Think about these all as a collection of technologies that can be part or not of a particular firewall. 6:13And the next one is this idea of a proxy. 6:16A proxy is something that acts on behalf of something else. 6:20So we have here a workstation that's coming in from the outside and it wants to hit this web server, for instance. 6:29Except what I'm going to do is say I'm going to put another server here in between that is the proxy. 6:36And what's going to happen is I'm going to break this session. 6:38Right now what you see depicted is a direct connection, end-to-end. 6:42I insert a proxy, I'm going to tell this guy, you're going to communicate directly with me 6:47and he is going to communicate directly with the back end Web server. 6:52Now we have two sessions. 6:53And what it is, is this guy thinks he's talking here, but in fact, he's talking to this guy. 6:59This guy thinks he's talking to this. 7:02In fact, he's talking to that. 7:04Now we have effectively a man-in-the-middle. 7:07But it's a good man in the middle. 7:09It's one that we put in there so that we can inspect the traffic. 7:13By the way, traffic coming in from the outside into my internal network. 7:16Maybe I want to have a look at that before I allow it in, see if it's got viruses or things like that. 7:21So I can inspect and I can enforce a security policy, if I need to. 7:26That's one of the advantages of putting in a proxy. 7:29By the way, sometimes people also put in proxies for privacy reasons, so that they can guard against who's seeing exactly who's doing what. 7:36It just looks like everything is coming from the proxy, not the actual end user, in that case. 7:43The final bit that I want to talk about here is actually maybe one of the most pervasive of these technologies, 7:49network address translation, or NAT for short. 7:52This is something that is probably in your home and you're probably using it right now and you may not know it. 7:59With NAT, what we do is, the Internet-- So by convention, we've all agreed by industry standard that there is a range of addresses 8:07that are reliable across the Internet and a range that are not reliable across the Internet. 8:13So this is specified in the in the rules for Internet traffic. 8:18If the address starts with a 10, then it doesn't matter what the other numbers are after that, 8:23because Internet addresses are always these four numbers separated by periods. That's the way we depict those. 8:30If it starts with a 10, if it's a 10 dot address, it is not routable across the Internet. 8:35It is routable across an internal intranet or across your home network. 8:40If you've got a home router, Wi-Fi router, whatever, you probably will find that it used a 10 dot address 8:48or more commonly it's used one of these 192.168 dot something dot something. 8:53That's very common in home setups. 8:56So this is an internal address that cannot be routed across the internet. 9:00That's why we need this NAT box. 9:02The NAT box does the translation, that's the T in NAT. 9:07So if this guy wants to send traffic that goes out to the Internet, his internal address, if he put that out directly, 9:14it would hit the first router on the internet and get blocked. 9:17It wouldn't go anywhere. 9:19But in fact, what we're going to do, is the NAT table, the NAT router or NAT firewall maintains a table where it's going to translate 9:26this into an external address, usually just a single address that is recognized for everything that's behind here. 9:34So it actually conserves IP addresses. 9:36I don't need I could have 100 of these different devices back here. 9:40They all look like just one address going out to the Internet. 9:43So I'm going to translate the traffic as it comes here into something that's routable so it can get out there 9:49and it will come back and then the NAT box will turn it back and send it back to the workstation that it needed to go to. 9:55Now that's just to preserve existing functionality. 9:58Where's the protection? 9:59The protection comes in the fact that if this guy out here wants to directly hit this workstation, 10:06he can't because the address for this workstation, this 192.168.1.1 is example is not routable across the internet. 10:16If he tries to send that, it won't go anywhere. 10:19So this way we have internal traffic and external traffic and we can flow this way. 10:25But it prevent someone from being able to get from the outside directly to the inside. 10:30And as I said, this is very common technology. 10:32It's usually built into all of the home routers. 10:36Okay, we just talked about firewalls. 10:38Now we're going to talk about segmentation. 10:41That is, how are we going to apply these firewalls in various network architectures to achieve different levels of security? 10:48Let's take the first one. 10:49This is the most primitive. 10:51I don't recommend this. 10:52Don't ever do this. 10:53But this in the early days of the Internet was a viable option for a lot of people. 10:57It's a bastion host. 10:58We basically take our web server and put it on the Internet because what we don't want is the internal network-- 11:06intranet --being exposed directly to the Internet. 11:10And if I don't put this somewhere outside here, then that means I have to allow all the Internet traffic into my internal network. 11:18And that's a really bad idea. 11:19So in the early days, people would put a single firewall right here, 11:23put their web server out here, or whatever devices, it had to be a bastion, last bastion on on the defense right out here on the edge. 11:32Again, not recommended. 11:34We have better ways to do it. 11:36The sort of next generation of this was a tri-homed network where in this case we've created 11:42essentially a firewall that we've carved off here into three different networks. 11:48So the firewall that's sitting here recognizes traffic coming in on one network interface card. 11:54And this traffic, for instance, all of the Internet traffic will be directed directly into where our Web server is. 12:01It's coming in on this network interface card, it will automatically be directed there. 12:05And maybe we apply some rules like the packet filtering and stuff like that. 12:09But that's where the traffic is destined to go in most cases. 12:13And likely in this case, the internal traffic, it's coming in on this network interface card, 12:19it could be routed here if somebody's internal user wants to hit our website. 12:23But it could also just as equally be trying to go out somewhere here. 12:28So here we have a single firewall sitting there, but it's got three different network interface cards. 12:33So it's trying to kind of do a lot of work in one place. 12:36And that's why it's called tri-homed. 12:38This is a DMZ of sorts. 12:41A demilitarized zone is the term we use there to refer to an area that's 12:46a buffer between an untrusted environment and a more trusted environment. 12:50Now, I'm going to use those terms very simplistically with apologies to people who understand what zero trust means, 12:54that there's really no trusted networks. But that's why we're essentially trying to show here's the red zone, the untrusted. 13:02The yellow zone is the semi trusted and the green zone is the more trusted zone. 13:08That's the idea here behind the color coding. 13:10Okay, move to the next one, the basic DMZ. 13:13And this is very popular. 13:15By the way, this last one is one that's often done in home networks. 13:19If you want to have an internal network and you want to allow guests to have access or your IoT devices or things like that. 13:26If you're hosting your own web server on your home network, not a great idea, but you could do it. 13:31You might want to separated out like this because again, it's a low cost option. 13:34That's the advantage is, it's very scalable. 13:37It's cheap. 13:39But on the downside, it's a single point of failure. 13:42If this thing doesn't do its job, everything's wide open potentially. 13:47Okay, moving on to the basic DMZ, which in this case I'm going to use two firewalls. 13:52So automatically I end up with more costs because I've got multiple security protections that I'm putting in place. 13:59And it's going to be more complex because I have to administer different rules and different capabilities here. 14:05And I gave an example of this in the first frame. 14:08In the first example before, when I talked about packet filtering and traffic coming in here and coming out there and so forth. 14:15That would be a basic DMZ. 14:18We got a red zone, a yellow zone, a green zone. 14:20Think of this as the traffic light. 14:22This is the danger untrusted, semi trusted caution. 14:25And then this is where it's more trusted. 14:27And we've built a kind of firewall rules to make sure that this can be trusted, because again, someone cannot go from here to here. 14:34We block that. 14:36We block that actually at this first firewall and then we have a secondary block here. 14:40And as a result, because we've got one block here and another block here, we have defense in depth. 14:47You remember going back to the very first video in this series, 14:50one of the principles I talked about that was important is this notion of defense in depth. 14:54I don't rely on any single security mechanism to protect me. 14:57If this firewall fails for some reason, I still can't get traffic from here to there because I've built in a rule 15:04that said the source address has to be traffic coming from this web server, for instance. 15:10And if this failed and all the traffic was able to come through it, then it would still be blocked by this second. 15:16So we've got defense in depth. 15:18It's also more scalable. 15:19So I could build up multiples of these, multiples of a lot of these kinds of things. 15:24So the opportunities are a lot greater. 15:27Again, not a single point of failure, but defense in depth. 15:31And then finally, I'll talk about a multi-tiered DMZ. 15:34So the multi-tiered DMZ, we basically put a firewall here and here. 15:39So now we've got this this diagram essentially replicated here. 15:43But in this case, I've split out the web server from the application server from the database, in this example. 15:50In this case, I'm going to implement yet another firewall, a third firewall in this case. 15:55So as you would guess, one of the downsides is it's going to be even more expensive than these others. 16:01It is going to be more costly and complex than these others, 16:05because now I've got three firewalls to administer and different rules on each one of them. 16:09However, we've got defense in depth on steroids. 16:14We've got even more because now any one of these mechanisms, it would have to be that all three of them failed. 16:20If one of them failed, it wouldn't necessarily be a huge problem for us. 16:24We also have greater granularity. 16:26That is, I can allow traffic to only go to here from this zone to this zone. 16:31I can allow traffic from this zone only to go to that zone and traffic from this zone only to go to that zone and do the reverse back. 16:39So more granularity, more firewalls, more cost and complexity. 16:43But potentially, if I do it right, more security. 16:47Okay, in the previous section, we talked about firewalls and segmentation. 16:52Now we're going to cover the next subject of virtual private networking VPNs. 16:57Now, what are VPNs designed to do? 16:59They're basically trying to give us a secure channel over an untrusted network. 17:04That's the idea. 17:05I can't necessarily trust the Internet because I don't control I don't have visibility into all of the aspects of that. 17:12But I'd like to be able to send secure information or information in a secure way over it. 17:18So I want a secure channel over an untrusted network. 17:21That would be a great capability. 17:23And the way I do that, I accomplish it by encrypting my information and then sending it over the network. 17:29The idea there is I get confidentiality. 17:31And I get that because people can't see what is in the packet. 17:36All they'll see is the encrypted information. 17:38We lots of times think about this as a pipe or as a tunnel. 17:41You'll hear those kind of analogies used here. 17:44Think about if we've got a user here with a browser trying to get to a web server and we're building a secure pipe, 17:51a connection from one end to the other. 17:54And I'm encrypting all the packets as they go across. 17:57So that way someone who looks here sees nothing that they can interpret, nothing that means anything. 18:03That's the idea behind a secure pipe, secure channel over an untrusted network. 18:08So that's the good stuff. 18:09And security guys love that we can do that. 18:12What they don't love is this. 18:15That is a limited inspection capability, this ability to-- so the good guy can send their traffic without everybody seeing it. 18:25It also means a bad guy could send their traffic without everybody seeing it and that would be a problem. 18:30So it limits our ability to inspect and therefore see if someone's putting malware into my system or someone's initiating an attack. 18:37So it's one of those blessings and a curse at the same time. 18:41All right. There are different kinds of VPN technologies. 18:44And to understand them, we really need a little bit of understanding on network technologies. 18:51A 7 layer OSI stack. 18:53This is classic stuff. 18:54We're not going to go into it in detail. 18:55But the notion is, is that there are different layers. 18:58For every packet I send, different concerns, different aspects that are implemented at different layers here. 19:04And what happens in the real world is most people, if you're an application programmer, 19:08you're really concerned more up here with the application, presentation layers, these kinds of things. 19:13And the networking infrastructure, people are much more concerned with the stuff down here 19:17at the transport network data link, physical layers and those kinds of things. 19:21So there's a little bit off concerns that separate there. 19:25But the other thing that's really important about this is, with this model, we have a way of, if you implement a security capability, 19:32for instance, at one of these layers, it's inherited by the upper layers. 19:37So if I encrypt all my traffic here, then it's encrypted by all the higher layers as well. 19:43So from a simple security standpoint, it might be easier to put the encryption down lower in the stack. 19:49We'll talk in a minute what hat's not necessarily what you always want to do, though. 19:53So there are different examples of how we do this. 19:57For instance, at the application layer. 19:59You may have heard of this protocol--secure shell. 20:02That's an example of an application layer or application specific VPN. 20:07It encrypts the data so that you can connect into a particular device console, this sort of thing. 20:12There's a secure FTP and other examples like that. 20:16Another one that's very common and you're going to run across this all the time, whether you're aware of it or not, 20:22is TLS or SSL--transport layer security or secure sockets layer. 20:29This is the older term. 20:30The newer name for this standard is TLS. 20:33It's implemented at the transport layer. 20:35That's what you usually see when you're a browser connected to a web server and you see that little lock in the browser up on the the URL line. 20:42That's what is is being implemented there, TLS. 20:46So that is everything that's going to that Web server then is going to be encrypted. 20:51There are other examples. 20:53There's a thing called IPsec, which is implemented at the network layer. 20:57If you do that, then everything between two network addresses will be encrypted 21:02as opposed to between the web server or for a very specific application. 21:07And then we have some other examples of point-to-point tunneling protocol, P2PTP or L2TP, which is the layer 2 tunneling protocol. 21:16These are some examples of even lower on the stack. 21:18So not to go into details on it, but just to give you an idea, there's not a single type of VPN or VPN technology. 21:25They all share some of these qualities. 21:27And if you see these things, you should think, ah that's a type of VPN. 21:32Now what's happening these days, is we're tending to move away from these broad network based VPNs 21:37more toward application specific VPNs. 21:41What's the reason for that? 21:43Well, on the advantage side for the broad ones, is that they're relatively simple. 21:48I set up a connection, for instance, between two endpoints or me into a particular network. 21:53And everything I do, for instance, if I set up an IPsec session, everything I send into that whole network now will be encrypted. 22:01So that's a very simple type of thing to do. 22:04However, it doesn't give us the granularity that we get over on this side with a very application specific firewall 22:11or VPN like we're doing here with SSH. 22:15The other advantage on the broad based side, network-based side, is a catch all. 22:19Again, if I encrypt at this layer, then all the traffic, all the different applications can benefit from that basic VPN. 22:27I don't have to set up separate ones. 22:29So it's simpler in that regard. 22:31However, I don't have as much control and as much granularity. 22:35The ability to control and say I have a VPN for my email, a VPN for my file sharing application, 22:41a VPN for my instant messaging application and control all of those separately gives me more control 22:48so that if I need to shut a particular service down or a particular user down, I can do that. 22:54So a lot of different possibilities here in this area of VPNs. 22:58Okay, now we've covered firewalls, segmentation, VPNs, and our last one is SASE. 23:05What is SASE?. 23:06It's secure access service edge. 23:09That's what the acronym stands for. 23:11It's actually a very relevant and important topic these days as part of the larger subject of zero trust. 23:18And in fact, another aspect of zero trust that's very relevant is micro-segmentation. 23:23And we talked about segmentation before, but micro-segmentation just carries that to the extreme 23:27and puts lots and lots of zones within your network with little micro networks. 23:33But SASE in particular. 23:35What we're trying to do here is create some sort of of secure capability that's delivered on the edge. 23:42To think about it this way. 23:44Let's look at a Venn diagram. 23:46Here, we've got networking concerns here. 23:49We've got security things and we've got the cloud. 23:52If you think about the intersection of network security and cloud, this is the world where SASE lives. 23:59Because-- and depending on how you want to think about this, if you think more mathematically, 24:03you might like this description, if you think more visually, you might like this one. 24:07We'll go through the mathematical one first. 24:09SASE is basically network security plus WAN, wide area networking capability. 24:16So that's the network and the security all delivered from the cloud. 24:20So that's the way of taking that Venn diagram and expressing it kind of as a loose mathematical equation. 24:28So if we were to decompose this a little more, what does it mean? What does the NetSEC mean, network security? 24:33Well, it's basically firewalling, which we've talked about. 24:36It's secure web gateways, which we didn't really go into detail, but think about those as application-specific firewalls and things of that sort. 24:45And DLP, data loss prevention, which is something I'll talk about in the data security domain when we get to that topic. 24:52But all of these things and more, delivered on the edge, so that's the network security component of all this. 24:59The WAN, specifically, is a software-defined WAN. Which is a way of creating a dynamic network 25:05where you can change where the boundaries of the network are and provision these in real-time, effectively. 25:11So it gives you a lot more agility and flexibility. 25:14So we're adding that capability, this SD-WAN marrying it, merging it, with the network security components 25:21and then delivering the thing from the cloud, because the cloud gives us the ability to do scalability. 25:26We can scale up and scale down elasticity and agility. 25:30Again, lots and lots of flexibility. 25:32That's what people are looking for in this case. 25:34If I take all of those things and then maybe even add in another thing within the security space, 25:39identity management, specifically, authentication and authorization. 25:44So some access controls, then this is what SASE is about. 25:48It's combining all of these functions into a single logical component and delivering that from the cloud, at the edge of the network. 25:56Another way to look at it is this way. 25:58So here we've got our users, here we've got the external network, and then I've got this SASE capability that's here in the middle. 26:07And what this delivers is on one end, the networking capabilities I mentioned previously, 26:12on the other end, also the security capabilities-- firewall and DLP and so forth. 26:19So all of this is is a way of combining these functions and delivering them. 26:24This is a more modern way of delivering all of these capabilities as opposed to what would have in the past 26:29each one of these would have been a separate appliance, a separate component, a separate administrative capability, 26:35a separate person to administer it and all of those kinds of things. 26:39So it's bringing these functions together and having them operate in a more holistic way. 26:44All right, now, we finished the networking topic. 26:47A couple of things that I didn't cover and I put here in the etc. 26:50just because of the interest of time, I didn't really get into very much in the physical networking side, 26:54things like 5G and Wi-Fi and the network security capabilities of those. 26:59If there's interest in that, put that down in the comments and maybe we'll revisit that in a future video. 27:05Until then, now we've completed the networking portion of our domains. 27:10The next one and, we want you to stay tuned and look for that one. 27:14The next one will be in the area of application security as we move along the various domains. 27:19Please remember to like, subscribe and hit notify so that you'll be aware when future videos in the series are available.