Objective 6.1: Security Devices
Appearance
Objective 6.1: Explain the function of hardware and software security devices
Network based firewalls – monitor traffic on the entire network segment, meaning an administrator monitors and controls firewall services from a central location.

Host based firewalls – is installed on an individual system and monitors and controls inbound and outbound traffic for just that system.

VPN concentrators increase remote access security. Concentrators sit between the VPN client and VPN server, creating a tunnel authenticating users and encrypting data as it travels. They also regulate and monitor data transfer across the tunnel, and control inbound and outbound traffic as an endpoint or router.