Book Image

Network Architect's Handbook

By : Alim H. Ali
Book Image

Network Architect's Handbook

By: Alim H. Ali

Overview of this book

Becoming a network architect is challenging—it demands hands-on engineering skills, encompassing hardware installation, configuration, and fabric layout design. Equally crucial, it involves collaboration with internal teams and C-Suite stakeholders, and adeptly managing external entities like vendors and service providers. The Network Architect's Handbook comprehensively covers these vital aspects, guiding you to evolve into an effective network architect within an organization, fostering seamless communication with leadership teams and other stakeholders. Starting with a clear definition of a network architect’s role, this book lays out a roadmap and delves into the attributes and mindset for success. You’ll then explore network architect design, physical infrastructure routing and switching, and network services such as DNS, MLAG, and service insertion. As you progress, you’ll gain insights into the necessary skills and typical daily challenges faced by network architects. And to thoroughly prepare you to advance in your career, this handbook covers certifications and associated training for maintaining relevance in an organization, along with common interview questions for a network architect's position. Armed with essential concepts, techniques, and your newfound skills, you’ll be well-prepared to pursue a career as a network architect.
Table of Contents (19 chapters)
1
Part 1 – Navigating the Architectural Blueprint of Networking
5
Part 2 – Crafting the Architectural Mind: Attributes and Mindset of a Network Architect
8
Part 3 – Constructing the Core: Building Blocks of a Network Architect
13
Part 4 – Mastering the Craft: Advancing Your Journey as a Network Architect

Understanding firewall rules

Firewall rules are another crucial component of network architecture, acting as the first line of defense (perimeter) in network security. Essentially, they are a set of guidelines that dictate how data packets are allowed to enter or leave a network. Network architects must be well-versed not only in understanding how firewall rules are applied on security devices but also in how they affect IT infrastructure, its distributed components, and end user’s/application’s capabilities to reach services.

Let’s consider an example.

We want to create two rules: allow HTTP traffic (port 80) from the internal network (192.168.1.0/24) to the internet while denying all other traffic, and block all SSH traffic from external sources to a specific server (for example, 192.168.1.10) within the internal network.

Figure 7.27 shows the configuration, as configured on a Palo Alto firewall appliance:

Figure 7.27 – Palo Alto firewall rules configuration

Figure 7.27 –...