A perimeter router is an entry point that allows external application to gain access through the internal services. It is basically inside a perimeter network known as demilitarized zone (DMZ) which is used to access the resources in private network through firewall. The internal router helps to ensure that certain VLAN are protected from traffic coming into the LAN. The firewall does the actual packet filtering.
How does it work for perimeter router?
There will be 4 steps in total that how a perimeter router works. The first step is external application sends a request message. This message will be address to the service’s external interface of the perimeter service router. The service will then hides the internal endpoint address. The second step is perimeter service router forwards request message to the service. This step basically forwards the message to the correct endpoint address and its base on the request of the correct services on the specific address where it was sent. The third steps is service sends a response. The service will perform a check such as authentication to ensure the security before processing the request. The last steps is perimeter service router forward the response to the external application. It basically refers to step 3. If the response in step 3 is processed, the perimeter service router will then forward the response to the external application.
There will be 4 steps in total that how a perimeter router works. The first step is external application sends a request message. This message will be address to the service’s external interface of the perimeter service router. The service will then hides the internal endpoint address. The second step is perimeter service router forwards request message to the service. This step basically forwards the message to the correct endpoint address and its base on the request of the correct services on the specific address where it was sent. The third steps is service sends a response. The service will perform a check such as authentication to ensure the security before processing the request. The last steps is perimeter service router forward the response to the external application. It basically refers to step 3. If the response in step 3 is processed, the perimeter service router will then forward the response to the external application.

This post actually give me information on how does the perimeter router used for and how it work, with the diagram aids, I have understand more about the DMZ or Perimeter network, and how also how to secure the network by running only certain services that are require and also closing unuse port as to prevent hacker from gaining access though those unuse port. Overall this post is quite informative
ReplyDelete