1/7
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
ZERO TRUST
everything must be verified
uses MFA, firewalls, monitoring and analytics
planes of operations
split the network into data plane and control plane
data plane
a. Process the frames, packets, and network data
Processing, forwarding, trunking, encrypting
control plane
a. Control the actions of data
b. Define policies and rules
Routing tables, session tables, NAT tables
security zone
Segments within a network that have specific requirements an controls
POLICY DECISION POINT
Process for making authentication decision
POLICY ENFORCEMENT POINT (PEP)
Allow, monitor and terminate connections
POLICY DECISION POINT
Process for making authentication decision