Enclave Network
A network enclave is a section of an internal network that is subdivided from the rest of the network.[1][2] Purpose
The purpose of a network enclave is to limit internal access to a portion of a network. It is necessary when the set of resources differs from those of the general network surroundings.[3][4] Typically, network enclaves are not publicly accessible. Internal accessibility is restricted through the use of internal firewalls, VLANs, network admissions control and VPNs.[5] Scenarios
Network Enclaves consist of standalone assets that do not interact with other information systems or networks. A major difference between a DMZ or demilitarized zone and a network enclave is a DMZ allows inbound and outbound traffic access, where firewall boundaries are traversed. In an enclave, firewall boundaries are not traversed. Enclave protection tools can be used to provide protection within specific security domains. These mechanisms are installed as part of an Intranet to connect networks that have similar security requirements.[6] DMZ within an enclave
A DMZ can be established within an enclave to host publicly accessible systems. The ideal design is to build the DMZ on a separate network interface of the enclave perimeter firewall. All DMZ traffic would be routed through the firewall for processing and the DMZ would still be kept separate from the rest of the protected network. References
Northcutt, Stephen. “Protected Enclaves Defense-in-Depth”. www.sans.edu. Archived from the original on 2019-03-06. Retrieved 2015-10-08. “Term:Enclave - FISMApedia”. fismapedia.org. Retrieved 2015-10-08. “Network Enclaves – Enhanced Internal Network Segmentation | Where Trust is Key!”. TrustCC blog. 2009-08-13. Archived from the original on 2013-02-13. Retrieved 2015-10-08. Rome, James. “Enclaves and Collaborative Domains web.oml.gov” (PDF). Enclaves and Collaborative Domains. “Protected Enclaves Defense-in-Depth”. www.sans.edu. Retrieved 2015-10-08.
"THE ROLE OF FIREWALLS AND GUARDS IN ENCLAVE BOUNDARY PROTECTION".
Category:
Computer network security
This page was last edited on 1 November 2023, at 19:44 (UTC). Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.
Privacy policy About Wikipedia Disclaimers Contact Wikipedia Code of Conduct Developers Statistics Cookie statement Mobile view
Wikimedia Foundation Powered by MediaWiki