Book Image

Network Architect's Handbook

By : Alim H. Ali
Book Image

Network Architect's Handbook

By: Alim H. Ali

Overview of this book

Becoming a network architect is challenging—it demands hands-on engineering skills, encompassing hardware installation, configuration, and fabric layout design. Equally crucial, it involves collaboration with internal teams and C-Suite stakeholders, and adeptly managing external entities like vendors and service providers. The Network Architect's Handbook comprehensively covers these vital aspects, guiding you to evolve into an effective network architect within an organization, fostering seamless communication with leadership teams and other stakeholders. Starting with a clear definition of a network architect’s role, this book lays out a roadmap and delves into the attributes and mindset for success. You’ll then explore network architect design, physical infrastructure routing and switching, and network services such as DNS, MLAG, and service insertion. As you progress, you’ll gain insights into the necessary skills and typical daily challenges faced by network architects. And to thoroughly prepare you to advance in your career, this handbook covers certifications and associated training for maintaining relevance in an organization, along with common interview questions for a network architect's position. Armed with essential concepts, techniques, and your newfound skills, you’ll be well-prepared to pursue a career as a network architect.
Table of Contents (19 chapters)
1
Part 1 – Navigating the Architectural Blueprint of Networking
5
Part 2 – Crafting the Architectural Mind: Attributes and Mindset of a Network Architect
8
Part 3 – Constructing the Core: Building Blocks of a Network Architect
13
Part 4 – Mastering the Craft: Advancing Your Journey as a Network Architect

What are ACLs?

ACLs are a set of instructions that are used to regulate access to network resources. Configured on network devices such as routers and switches, ACLs determine which traffic is allowed or denied in a network segment based on the following criteria:

  • IP addresses
    • Source IP address, which identifies the originating address of the traffic
    • Destination IP address, which specifies the target address
  • Protocol type
    • The type of protocol (for example, TCP, UDP, ICMP).
  • Port numbers
    • The specific port numbers involved in the communication
  • Traffic flow
    • Direction of traffic (ingress or egress)

Operating as a fundamental security tool, ACLs help protect the network from external threats and limit potential attack vectors.

Note

ACLs primarily operate at Layer 3 (the network layer) and Layer 4 (the transport layer) of the OSI model.

Let’s look at an example:

Figure 7.22 – ACL example

Figure 7.22 – ACL example

In this example, we have several...