All Episodes

October 2, 2025 24 mins

professorjrod@gmail.com

Dive deep into the essential building blocks of secure enterprise networks with Professor J. Rod in this comprehensive exploration of network architecture, security appliances, and remote access solutions.

What makes a truly secure organizational network? It's more than just firewalls and fancy equipment—it's thoughtful design, strategic implementation, and layered defenses. We break down how enterprise networks function as digital blueprints, explaining everything from switching topologies to routing infrastructure in accessible terms. You'll understand why proper segmentation matters and how VLANs create logical separation between departments sharing physical resources.

Security isn't about building one impenetrable wall anymore. Modern protection requires defense-in-depth with multiple control types across various network zones. We examine critical security appliances including next-generation firewalls, intrusion detection systems, web application firewalls, and load balancers—explaining not just what they do but where they belong in your architecture. You'll learn the difference between Layer 4 and Layer 7 inspection, why proper device placement matters, and how to choose between fail-open and fail-close configurations based on your organizational needs.

With remote work now standard, we tackle virtual private networks and secure access solutions that keep distributed teams connected safely. From TLS tunneling to IPsec implementation, SSH management to jump servers, you'll gain practical insights into protecting your extended network perimeter. The episode concludes with CompTIA-style practice questions to test your understanding of key concepts. Whether you're studying for certification or managing enterprise infrastructure, this episode provides the knowledge foundation to build truly resilient network architectures. Subscribe for more in-depth technology explorations that bridge theory and practical application.

Inspiring Tech Leaders - The Technology Podcast
Interviews with Tech Leaders and insights on the latest emerging technology trends.

Listen on: Apple Podcasts   Spotify

Support the show


Art By Sarah/Desmond
Music by Joakim Karud
Little chacha Productions

Juan Rodriguez can be reached at
TikTok @ProfessorJrod
ProfessorJRod@gmail.com
@Prof_JRod
Instagram ProfessorJRod

Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
SPEAKER_00 (00:29):
And welcome to Technology Tech.
I'm Professor Jay Well.
In this episode, Securing theEnterprise Network.
Let's get into it.

(01:10):
The show where we take a deepdive into tools, technologies,
and tactics shaping thecybersecurity world.
I'm your host, Professor J.
Rod, and today we're tacklingone of the most critical and
complex parts of moderncybersecurity, enterprise
network architecture.
If you ever wondered howorganizations build secure,
scalable, and resistantnetworks, or how you can protect

(01:33):
on-premise environments from anattack, this episode is for you.
From switching and routing tofirewalls, load balancers, VPNs,
and remote access security.
We're going all in.
So grab your notebook.
Let's get started.
When we talk about enterprisenetwork architecture, think of

(01:54):
it as the blueprint of thedigital city that powers an
organization.
Just like a real city has roads,buildings, and power lines, your
enterprise network has switches,routers, and addressing schemes,
all working together totransport information securely
and efficiently.
Let's break down the key layers.
Every network starts withselection and placement,

(02:15):
deciding where to put devicesand how to connect them.
We're not just throwing cablesaround.
This is strategic.
We also consider infrastructure,the media, fiber, copper,
wireless appliances, andaddressing system.
Applications and services, howdata is delivered and secure.
Workflows, how information movesbetween departments.
Access, who's allowed where andhow that's enforced.

(02:39):
Think of a company like ahospital.
You have critical patient datain one wing, public Wi-Fi in
another, and administrativerecords somewhere else.
The way you segment and protectthose areas, that's network
architecture at work.
Switching infrastructure.
Switches are like trafficdirectors.

(02:59):
They manage traffic within yourlocal network.

But here's the thing (03:02):
topology matters.
You got physical topology, howcables connect devices, and
logical topologies, how dataactually flows.
You use structured cabling toorganize the mess, and you use a
hierarchical design, coredistribution and access flare to
improve performance and limitbroadcast storms.

(03:23):
Why?
Because when everybody shouts onthe same network segment, things
get noisy and slow.
A well-designed switch topologylimits broadcast domains and
enforces segmentation.
Routing infrastructure.
Routing takes us to the layerthree where we separate networks
using subnets.

(03:43):
IP4, IP6, Subnet mask, allessential.
VLANs lets us match logicallayer two segments to layer
three subnets, making ournetwork flexible.
Here's an example.
Finance and HR might share thesame physical switch, but VLANs
let them live in separatelogical neighborhoods.
Security zones.

(04:05):
Every zone has its own accesscontrol and security
requirements.
Public zones are your websites,your DMZs, private zones are
your file servers database, andmanagement zone is the
infrastructure servers.
Segmenting into zones reduceyour attack surface.
Think of it as having wallsbetween buildings.
If one compromise, the wholecity doesn't fall.

(04:29):
Attack surface.
Every connection point is apotential throwaway for
attackers.
Weak architecture might lead tosingle points of failure,
overcomplexity, lack ofdocumentation, overdependence on
perimeter firewalls.
Modern security isn't about onebig wall.
It's defense and depth.
Layers of protection across theentire network.

(04:51):
Port Security.1X requirescredentials tied to Active

(05:18):
Directory.
And I've seen where an employeekind of goes rogue and starts
putting in equipment that'sunauthorized.
Right?
I worked at a place where theyput in a wireless router on the
network just because the companydidn't want to get wireless.
Like the company was a littlebit on the behind in technology.

(05:41):
They did not want wireless.
Everybody else had wireless, butwe didn't.
And these techs put a wirelessrouter on the infrastructure,
and nobody knew about it.
And they didn't even notice thateverybody was bringing in their
personal laptops from home.
This is when Netflix went fromCDs, from DVDs, to streaming.

(06:06):
So everybody was got caught upin that craze.
But yeah, that happens.
Physical isolation.
Sometimes you go to extreme airgap networks.
Think nuclear facilities orclassified systems.
They're physically disconnected.
No internet, no Wi-Fi, onlyupdates via USB.
Or floppy.

(06:26):
Secure but hard to manage.
Architecture consideration.
Every architect must balancecost versus performance,
scalability versus complexity,availability versus budget,
patchability and vendor support,and risk transference.
Outsourcing to third parties,usually an insurance company.
When they talk about risktransference, they're talking

(06:47):
about insurance.
It's like building a house.
Cheap materials might save moneynow, but cost more later when
the roof leaks.
Network security appliances.
Once your network is designed,you must protect it.
Here's where security appliancecomes in firewalls, proxies,

(07:08):
IDS, IPS, WAFs, and loadbalancers.
Device placement.
Where you place a devicedetermines its roles.
Zone borders, firewalls, ACLs,that's preventive.
Within zones, IDS, sensors,that's detective.
Endpoint, antivirus, EDR, that'scorrective.

(07:29):
This is defense in depth.
Not just one line of defense,but layers across the stack.
Device attributes, active versuspassive.
Active controls requireconfiguration, for example,
firewalls.
Passive controls monitorsilently.
Example network taps.

(07:49):
Inline versus tap monitor.
Inline is a bump in the wire,can allow block traffic.
Tap is observed only, nointerference.
Fail open versus fail close.
Fail open, availability first,traffic still flows.
Fail close, security first,traffic is stopped.
In a hospital, you might preferfail open.
You can't block life criticalsystems, but in finance firms,

(08:13):
fail close might be safer.
Firewalls.
Firewalls enforce accesscontrollers.
They inspect IP address, ports,protocols, TCP, UDP types.
They can drop, deny, or acceptpackets.
Modern networks use multiplefirewalls.
Edge routers, internalsegmentation firewalls, and

(08:36):
cloud gateways.
Layer four and seven firewalls.
Layer four, transport, checksTCP, UDP sessions, connection
state, handshake, make sure thethree-way handshake goes
through.
Layer seven, the applicationunderstands HTTP, DNS, SMTP, can
block attacks like SQL injectionor XSS.

(08:57):
Deep packet inspection letslayer seven firewall look inside
traffic, not just at headers.
Proxy servers.
For proxy, clients, proxy,internet, reverse proxies,

(09:35):
internet, proxy, internalservers.
They cache, filter, andauthenticate users.
Think of a reverse proxy as abodyguard standing in front of
your web server.
IDS and IPS.
IDS, intrusion detection system,is passive alert, and IPS is
intrusion prevention systemsactively block it.
It's in the name, guys.

(09:56):
Look, intrusion detection, itjust detects where intrusion
prevention does something,right?
The detection will let you know.
Email, some kind of alarm,right?
So you get notified ifsomething's wrong.
An IPS does something.
So for example, you have astudent that, you know, you're

(10:18):
in the conference room and youhave a laptop, only that laptop
is allowed to be plugged intothat port in that conference
room.
And somebody comes in anddisconnects it.
A student comes in anddisconnects it and puts in his
laptop.
Well an IDS will give you anemail and say, hey, somebody, an
unauthorized computer justplugged into the port in the

(10:39):
conference room.
Where an IPS will cut theconnection.
That's the difference.
Placed in line or on a mirrorport, these systems monitor
patterns and integrate withsemi-tools.
Example of Security Onion orSnort analyzing packets in real
time.
Next generation firewalls andUTM.

(11:02):
Next generation firewalls doapplication aware filtering,
user-based rules, and cloudinspection and IPS.
UTM Unified Threat Managementcombines multiple functions,
firewalls, anti-malware, spamfiltering, DLP, VPN, all in one
box.
Great for small and mediumenterprise, but remember Jack

(11:22):
and Ball trays may be slowerthan the specialized gear.
Load balancers.
Distribute traffic acrossmultiple servers for redundancy,
performance, and availability.
Types layer four based on IPslash port and layer seven,
content aware.
They use algorithms like Robin,lease connection, or weighted

(11:47):
response.
If one server fails, HeartbeatCheck shifts traffic
automatically to the to theother.
WAF inspect HTTP traffic andmatch against unknown
vulnerabilities.
They block things like SQLinjection, cross-site scripting,
path to Russell.
You can deploy them as hardware,software, or cloud services.

(12:12):
Segment three, virtual privatenetwork and remote access.
Remote work is a new norm andsecure remote access is now
non-negotiable.
Remote access architecture.
You can design client-to-siteVPNs, user connects from
anywhere, site-to-site VPNs,link office securely, and TLS

(12:33):
tunnel, IPsec tunnels, and SSLVPNs.
Each must authenticate users andencrypt data in transit.
TLS tunneling.
TLS tunneling uses PKIcertificates for authentication
and a radius for usercredentials.
They can run over TCP or UDP,encapsulating internal traffic

(12:54):
with a secure tube through theinternet.
Think of it like a secure subwayline, carrying your packets
across the public network.
IPsec tunneling.
IPsec offers confidentiality,integrity, and authentication.
The authenticated header is itfor integrity only, and the ESP
encapsulation security payloadis encryption and integrity.

(13:17):
Modes, you can do transportmode, host to host, or tunnel
mode, gateway to gateway.
Use heavenly and enterpriseside-to-side VPN.
Internet key exchange.
IKE establishes securityassociates between peers.
Phase one, authentication,search or pre-share keys.
Phase two, encryption method,either AES, 3DS, etc.

(13:41):
Ike version 2 supports mobileclients and faster connection.
Remote desktop.
RDP allows GUI-based remoteaccess to physical or virtual
machines.
With RDP Gateway, you canconnect securely to internal
apps through a browser.
Great for hybrid workforces.
SSH.

(14:03):
SSH secures command line accessfor admins.
Uses public-private key pairs,commands like SSH, SCP, supports
core for enterpriseauthentication.
Out-of-band management and jumpserver.
Admins needs a secure path evenif the main network fails.

(14:23):
Out-of-band management usesconsole ports or VLANs.
Jump servers act as controlgateway to sensitive system.
In military-grade networks, youoften see secure admin
workstations that can onlyconnect to jump boxes, never
directly to the internet.
Alright, let's recap what welearned today.

(14:45):
One, network, enterprise networkarchitecture, segmentation,
scalability, and resistancematter, security appliances.
Place your controlsstrategically, layer your
defenses.
Three, VPN ensuresconfidentiality and
authentication for remote users.
And four, management path.

(15:07):
Keep admin access separate andsecure.
Remember, a secure network isone that's planned, layered, and
documented.
Alright, now that we got thatdone, let's do the four
questions.
Alright, I'm going to give youfour questions, and they're all

(15:28):
going to be multiple choice.
They're CamTIA-like questions,right?
CompTIA practice questions.
I'm going to give you four.
I'm going to read them twice andI'm going to give you five
seconds to answer them.
And let's see if you come upwith the right answer.
Alright, question number one.
Which of the following bestdescribes the function of a
layer seven firewall?

(15:48):
A filters traffic based on MACaddress.
B blocks packets based on IP andport.
C Analyze application layer datafor threats.
And D routes packets usingdynamic routing protocols.
I'll read it again.
Which of the following bestdescribes the function of a
layer 7 firewall?
A filters traffic based on MACaddress.

(16:11):
B blocks packets based on IP andport.
C analyzes application layerdata for threats.
And D routes packets usingdynamic routing protocols.
Now, this is for me, this is aneasy one, right?
Because as a lot of Cantiaquestions are, there's actually
a big clue in the question.

(16:33):
Right?
If you listen to the question,there's a there's a huge clue
that will give you what theanswer is.
I'll give you five seconds tothink about it.
Five, four, three, two, one.
All right.
So what is the big clue?
The big clue in the question islayer seven firewall.
Right?
Now, you gotta know what layerseven is in the OSI model.

(16:57):
If you know what layer seven isin the OSI model, and we went
over it in in the slide, youknow what the answer is.
And in this case, the answer isC.
Analyze application layer datafor threats.
Right?
A layer seven firewall inspectsapplication data, enabling deep
packet inspection and protectionagainst attacks like SQL

(17:19):
injections.
Sometimes, ladies and gentlemen,the answer is in the question.
CAMTIA likes to do that,especially with A and Network
Plus, and you have to learn howto dissect it.
I call it dissect the questions.
You know, it's just critical,it's critical thinking, right?
That's really what it is.
And if you have this skill, youcould almost take any CamTea

(17:43):
exam and not necessarily passit, but you could get a, you
know, you could get a good mark.
Maybe you could pass it.
You could definitely get a goodmark.
I'm not saying, you know,because if you don't know what
the definitions are, you're notgonna pass, right?
If you don't know what layerseven is, you're not gonna pass.
So, you know, you there's someknowledge that you need, right?

(18:05):
But if you if you have theknowledge and you and you
practice critical thinkingskills, you can pass this
computer exam.
All right, question number two.
What is the main differencebetween AH authentication header
and ESP and IP set?
A AH encrypts data, ESPauthenticates headers, B, AH

(18:28):
provides integrity, ESP providesencryption.
C, both AH and ESP providesencryption, or D AH uses SSL,
ESP uses TLS.
Again, I'll read you thequestion.
What is the mean differencebetween AH and ESP and IPsec?

(18:50):
A AH encrypts data, ESPauthenticates headers, B AH
provides integrity, ESP providesencryption.
C, both AH and ESP provideencryption, or D AH uses SSL,
ESP uses TLS.

(19:11):
Now I'll give you five secondsto think about it.
Five, four, three, two, one, andyour answer is B.
Right, and we went over it inearlier, right?
Uh AH provides integrity, ESPprovides encryption.
AH ensures integrity only, whileESP provides both encryption and

(19:37):
integrity.
So it does both.
But it's only asking you for it,only provided one, but which is
good enough.
All right.

Question number three (19:46):
which device placement strategy best
supports defense in depth?
A.
Place all controls on theperimeter.
B use one firewall and disableIDS.
C.
Lay preventive, detective, andcorrective controls across
zones.
Or D.
Rely on a single UTM at thegateway.

(20:08):
I'll read it again.
Which device placement strategybest supports defense and depth?
A place all controls at theperimeter.
B use one firewall and disableIDS.
C layer preventive, detective,and corrective controls across
zones, or D.
Rely on a single UTM at thegateway.

(20:31):
So it's asking which one ofthese, out of all the ones that
I just read, is best supportsdefense and depth.
And that's the big clue there isdefense in depth.
I'll give you five seconds tothink about it.
Five, four, three, two, one.
All right.
Hopefully you got the answer.
What do you think the answer is?

(20:52):
The answer is C.
Layer preventive, detective, andcorrective controls across
zones.
Defense in depth requiresmultiple control types across
multiple zones, not a singlepoint of defense.
That's what defense in depth is.
Just think of it as like a, Ithink of it as a circle, right?
You have one circle, then youhave a circle in the circle, and

(21:14):
then a circle in the circle, andanother circle in the circle.
That's kind of like how when Ithink of defense in depth.
All right, last one.
An organization wants to preventunauthorized devices from
connecting to switch ports.
Which technology should theyuse?
A port mirroring, B, 802.1x withradius, C, VLAN tagging or D MAC

(21:37):
flooding.
I'll read the question again.
An organization wants to preventunauthorized devices from
connecting to switch ports.
Which technology should theyuse?
A port mirroring, D, 802.1x withradius or C VLAN tagging or D
MAC flooding.
I'll give you five seconds tothink about it.

(21:59):
Five, four, three, two, one.
Now, if you remember the storythat I said before about the
unauthorized putting in of awireless router inside the
company network, unauthorized,of course, you would know that
the answer is B.
802.1x authentication withradius ensures only authorized

(22:24):
user slash devices can connectto network ports.
And that's what was not set upin where I one of the companies
that I worked, and the employeeswent in there, put a wireless
router.
I don't even know if they had apassword.
I'm sure they had a password inthere.
And they only gave it to thehelp desk techs for they can

(22:47):
stream Netflix.
This this was like, I don'tknow, 20 years ago, maybe.
Uh 15, 20 years ago.
And guess what?
Luckily, nobody got fired.
Nobody got fired.
So I don't know.
I don't know how to take that.
I don't know how to take that,honestly.
So, but and then and how theyfound out is it was weird.

(23:08):
Actually, I shouldn't say it,but yeah.
Don't do that, guys.
Don't don't bring unauthorizedequipment into your your company
network.
You might get fired.
You might not be so lucky asthose guys were.
All right, that's it for today.
Let's deep dive into enterprisenetwork security.
Remember, technology keepsinvolving, and so should you.

(23:31):
Stay curious, stay certified,and as always, keep tapping into
technology.
This has been a presentation ofLittle Chatcha Productions, art
by Sabra, music by Joe Kim.
We're now part of the Pod MatchNetwork.
You can follow me at TikTok atProfessor Jrod at J R O D, or

(23:55):
you can email me at ProfessorJrodj R O D at Gmail dot com.
Advertise With Us

Popular Podcasts

Las Culturistas with Matt Rogers and Bowen Yang

Las Culturistas with Matt Rogers and Bowen Yang

Ding dong! Join your culture consultants, Matt Rogers and Bowen Yang, on an unforgettable journey into the beating heart of CULTURE. Alongside sizzling special guests, they GET INTO the hottest pop-culture moments of the day and the formative cultural experiences that turned them into Culturistas. Produced by the Big Money Players Network and iHeartRadio.

Crime Junkie

Crime Junkie

Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.