A-Z Popular Blog Security Search »
Information Security

3 Examples of a Network Perimeter

 , updated on
A network perimeter is a boundary that is established by firewalls and other information security infrastructure to partially isolate a network or host from external threats. This can be thought of as a virtual wall that lets some things through and stops other things based on rules or algorithms. The following are illustrative examples of a network perimeter.

Host Perimeter

A firewall on a server or device that prevents external entities from using certain local resources such as a port.

Local Perimeter

It is common for an organization's internal network to have multiple zones that are each protected by a network perimeter. For example, a bank may isolate backend servers such that only specifically authorized IPs may establish a network connection.

External Perimeter

The main perimeter between an organization's local networks and the internet. This may restrict ports, applications and protocols. Traffic between an internal network and external network may also be closely monitored by security infrastructure such as an intrusion detection system.
Overview: Network Perimeter
A boundary that is established by firewalls and similar infrastructure to partially isolate a network or host.
Related Concepts


This is the complete list of articles we have written about networking.
Campus Network
Internet Backbone
Internet Of Things
Last Mile
Network Security
Personal Branding
Pervasive Networks
Point Of Presence
Private Network
Proxy Server
Public Network
Reverse Proxy
Space Network
More ...
If you enjoyed this page, please consider bookmarking Simplicable.

Network Security

An extensive list of network security techniques.

Christmas Tree Packet

An overview of Christmas tree packets.


A definition of honeypot with examples.

Overlay Network

Building networks on top of networks for security and privacy.

Proxy Server

A definition of proxy server with common examples.

Security vs Privacy

The relationship between security and privacy.


An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Security Through Obscurity

A definition of security through obscurity with an example.


A definition of token with examples.


A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map