Hot Site – The primary operation site; this is where the network actually exists, on a daily basis.
Cold Site – A backup location, with redundant equipment and resources, which can become hot should the primary site become unavailable (as in a disaster).
When setting up your network with an eye towards redundancy, there are many key areas to consider, whether everyday components, spare parts on hand, or fault-tolerant technology:
This objective looks very much like the one you'll encounter later in 4.3, but the key here may be in the examples. Here, you are troubleshooting remote connectivity problems a remote user is encountering, but WAN protocols are specified. You'll still need to determine the symptoms and how many users or portions of your wider network are affected. You still should check for physical connection issues, and what in the environment has changed since connections were possible before (assuming they were possible). However, in this objective, network configuration settings on the remote station will be somewhat more important; bear in mind when which protocols are appropriate and the various authentication issues that can arise.
As we discussed in Objective 2.10, a firewall marks the difference between a public and private network. Realizing that your network is actually part of the larger Internet, anything behind the firewall (namely, your network) is a private network. Anything in front of it is a public network. Just as a structural firewall protects anything behind it from any fire that might start in front of it, a network firewall keeps intruders (hackers, clumsy surfers, corporate spies, etc) that might approach from in front of it from getting to the network behind it.
A firewall is usually hardware, software, or a combination of the two that marks the boundary between your “private” network and the part of the Internet—which may even include part of your overall network—that remains “public.”
Firewalls cannot protect against all forms of intrusion. For instance, a firewall will allow anyone with a correct login and password access to the network. Obviously, the firewall has no way of knowing if the user to whom that login and password have been assigned is actually the user logging in at any given time. Also, while some firewalls offer virus protection, it is a far better practice to install anti-virus software on each computer and then keep the anti-viral signatures up to date. And spam is going to happen so long as you accept e-mail.
A firewall can minimize those threats against which it is able to protect the network. How effective a firewall will be will depend on how it is configured.
The highest level of security would be to block everything, which obviously defeats the purpose of having a network, not to mention a firewall, in the first place. The second level is to start with the first level and limit access from there.