Panel |
---|
borderColor | green |
---|
bgColor | transparent |
---|
borderWidth | 2 |
---|
|
Additional sections: |
When networks using different levels of trust are interconnected, the prevailing security model is to create a gate through which all inter-network communications must pass; that is, a single point (or very limited number of points) at which security policies are enforced. In most scenarios, the greatest concern is generally when an external untrusted network communicates with a trusted network. The
is positioned at the network border to guard the internal network (core network) from security threats.
The Sonus
can be deployed between two service provider networks in a peering environment (NNI), or between an access network and a backbone network to provide service to residential and/or enterprise customers.
...
...