{"id":440,"date":"2024-05-18T17:15:12","date_gmt":"2024-05-18T17:15:12","guid":{"rendered":"https:\/\/www.circlecityinternet.com\/?p=440"},"modified":"2024-05-23T04:07:03","modified_gmt":"2024-05-23T04:07:03","slug":"protecting-a-network","status":"publish","type":"post","link":"https:\/\/www.circlecityinternet.com\/ro\/our-ramblings\/protecting-a-network\/","title":{"rendered":"Protejarea unei re\u021bele"},"content":{"rendered":"<p>\"C\u00e2t de sigur\u0103 este re\u021beaua dumneavoastr\u0103?\"<\/p>\n\n\n\n<p>\u00centrebarea ne-a fost adresat\u0103 de c\u00e2teva ori, a\u0219a c\u0103 am considerat oportun s\u0103 scriem o postare pe blog despre aceasta.  F\u0103r\u0103 a intra \u00een prea multe detalii tehnice, voi eviden\u021bia practicile de securitate standard \u0219i modul \u00een care le pute\u021bi implementa \u00een propria re\u021bea de acas\u0103.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Segregarea re\u021belei noastre<\/strong> - <\/p>\n\n\n\n<p>Ne-am \u00eemp\u0103r\u021bit re\u021beaua \u00een segmente diferite, fie fizic, fie prin mijloace virtuale, cum ar fi VLAN-urile. Acest lucru ne permite s\u0103 limit\u0103m orice bre\u0219\u0103 de securitate (dac\u0103 \u0219i c\u00e2nd apare) la o singur\u0103 zon\u0103\/segment al re\u021belei noastre. De asemenea, putem aplica controale de securitate \u0219i monitorizare diferite pentru fiecare zon\u0103. <br><br>Cum v-a\u021bi putea separa re\u021beaua? Exist\u0103 multe modalit\u0103\u021bi diferite prin care v\u0103 pute\u021bi proteja re\u021beaua de acas\u0103 cu ajutorul segreg\u0103rii. De exemplu, poate pune\u021bi re\u021beaua wifi pentru oaspe\u021bi pe un VLAN \u0219i SSID diferit, astfel \u00eenc\u00e2t, dac\u0103 unul dintre oaspe\u021bi sose\u0219te cu un dispozitiv piratat, acesta s\u0103 nu v\u0103 infecteze re\u021beaua. Sau poate dori\u021bi s\u0103 v\u0103 plasa\u021bi dispozitivele IoT sau dispozitivele inteligente \u00eentr-o re\u021bea virtual\u0103 diferit\u0103. Sau poate camerele dvs. de securitate, pe care dori\u021bi s\u0103 le amplasa\u021bi \u00eentr-o re\u021bea fizic diferit\u0103, cu m\u0103suri de securitate mai stricte. Exist\u0103 multe moduri \u00een care pute\u021bi utiliza aceast\u0103 metod\u0103 pentru a \u00eembun\u0103t\u0103\u021bi securitatea re\u021belei dvs.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Bloca\u021bi re\u021beaua<\/strong> - <\/p>\n\n\n\n<p>Acesta este destul de amplu. Deci, pentru \u00eenceput, echipamentul de re\u021bea este securizat fizic cu straturi de securitate fizic\u0103 - instala\u021bii \u00eenchise, dulapuri \u00eenchise, camere de securitate etc. Apoi exist\u0103 securitatea digital\u0103. Toate dispozitivele au parole securizate diferite. Autentificarea cu mai mul\u021bi factori (MFA) este implementat\u0103 ori de c\u00e2te ori este posibil.  <\/p>\n\n\n\n<p>Din punct de vedere al firewall-ului, \u00een mod implicit totul este dezactivat \u0219i blocat. Noi deschidem doar ceea ce este necesar pentru desf\u0103\u0219urarea activit\u0103\u021bii. Acest lucru ajut\u0103 la prevenirea unor lucruri precum atacurile DDoS, atacurile de amplificare DNS \u0219i a\u0219a mai departe. De exemplu, lua\u021bi captura de ecran de mai jos - acesta este doar un filtru - un DNS Amplification care ar fi r\u0103u pentru re\u021bea. Bloc\u0103m peste 1000+ cereri DNS externe pe secund\u0103 (la momentul scrierii acestui articol). <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"833\" height=\"673\" src=\"https:\/\/www.circlecityinternet.com\/wp23\/wp-content\/uploads\/2024\/05\/DNS_Amplification.png\" alt=\"\" class=\"wp-image-441\" srcset=\"https:\/\/www.circlecityinternet.com\/wp23\/wp-content\/uploads\/2024\/05\/DNS_Amplification.png 833w, https:\/\/www.circlecityinternet.com\/wp23\/wp-content\/uploads\/2024\/05\/DNS_Amplification-300x242.png 300w, https:\/\/www.circlecityinternet.com\/wp23\/wp-content\/uploads\/2024\/05\/DNS_Amplification-768x620.png 768w\" sizes=\"(max-width: 833px) 100vw, 833px\" \/><\/figure>\n\n\n\n<p>Cum pute\u021bi implementa o \u00eenchidere a re\u021belei dvs.? Pentru \u00eenceput, securitatea fizic\u0103 nu este o idee rea. Nu v\u0103 l\u0103sa\u021bi routerul \u0219i comutatoarele la vedere. Dac\u0103 ave\u021bi un dispozitiv care are Wifi \u00eencorporat, de obicei acestea nu se descurc\u0103 prea bine \u00eentr-un dulap. Lua\u021bi \u00een considerare un punct de acces Wifi de sine st\u0103t\u0103tor. Exist\u0103 multe unit\u0103\u021bi de montare pe tavan care arat\u0103 foarte bine, ofer\u0103 o acoperire mai bun\u0103 \u00een \u00eentreaga locuin\u021b\u0103 \u0219i adaug\u0103 un strat fizic de securitate. <\/p>\n\n\n\n<p>Asigura\u021bi-v\u0103 c\u0103 firewall-ul este activat pe router. O mul\u021bime de routere moderne au o mul\u021bime de func\u021bii pe ele. Activa\u021bi-le doar pe cele pe care le utiliza\u021bi. \u00cen caz contrar, deschide\u021bi poten\u021biale g\u0103uri \u00een re\u021beaua dumneavoastr\u0103. G\u00e2ndi\u021bi-v\u0103 \u00een felul urm\u0103tor: un lac\u0103t la u\u0219a de la intrare nu v\u0103 ajut\u0103 prea mult dac\u0103 ave\u021bi mai multe ferestre deschise \u00een cas\u0103.  <\/p>\n\n\n\n<p>Folosi\u021bi parole puternice. A\u0219 putea scrie o \u00eentreag\u0103 postare pe blog tocmai despre acest lucru. Asigura\u021bi-v\u0103 c\u0103 nu folosi\u021bi parolele implicite pentru router, SSID-ul wifi-ului etc. Am vorbit mai devreme despre wifi-ul pentru oaspe\u021bi - a\u0219a c\u0103 voi vorbi din nou despre asta pentru un minut. Wifi-ul dvs. normal ar trebui s\u0103 aib\u0103 o parol\u0103 criptic\u0103. F\u0103-o at\u00e2t de lung\u0103 \u00eenc\u00e2t s\u0103 \u021bi se \u00eencruci\u0219eze ochii c\u00e2nd o tastezi. Apoi, poate ave\u021bi parola wifi-ului pentru oaspe\u021bi pu\u021bin mai u\u0219oar\u0103. Ar trebui s\u0103 fie \u00een continuare sigur\u0103, dar poate fi o fraz\u0103 u\u0219or de re\u021binut. \u00cen timp ce sunte\u021bi la ea, dac\u0103 ave\u021bi posibilitatea de a accelera wifi dvs. de oaspe\u021bi - o fac. \u00cen acest fel, dac\u0103 cineva, cumva, ob\u021bine parola wifi-ului dvs. pentru oaspe\u021bi, nu este capabil s\u0103 consume toat\u0103 conexiunea dvs. disponibil\u0103 la internet. <\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Utilizarea traducerii adreselor de re\u021bea (NAT)<\/strong> - <\/p>\n\n\n\n<p>Aceasta traduce adresele IP private ale re\u021belei noastre \u00een IP-uri publice pentru comunicarea extern\u0103 c\u0103tre internet. IPv4 a fost epuizat de mult timp, astfel \u00eenc\u00e2t conservarea acestei resurse este important\u0103. Aici intr\u0103 \u00een joc NAT. \u00cen mod implicit, nu distribuim IP-uri publice clien\u021bilor. Acest lucru ajut\u0103 la conservarea aloc\u0103rii IPv4, dar ofer\u0103 \u0219i un nivel de confiden\u021bialitate \u0219i securitate pentru re\u021belele dvs. \u00cen loc ca un IP public s\u0103 fie expus direct la routerul dvs., primi\u021bi un IP intern. Dac\u0103 dori\u021bi un IP public, acest lucru poate fi realizat \u00een continuare la un cost suplimentar. Contacta\u021bi-ne pentru detalii. <\/p>\n\n\n\n<p>S-a spus mult timp c\u0103 NAT cauzeaz\u0103 probleme cu jocurile \u0219i serviciile VOIP. Cu toate acestea, acest lucru devine o problem\u0103 din ce \u00een ce mai pu\u021bin important\u0103, deoarece furnizorii au v\u0103zut nevoia de NAT mai mult dec\u00e2t oric\u00e2nd, odat\u0103 cu expirarea IPv4. <\/p>\n\n\n\n<p>Cum utiliza\u021bi NAT \u00een re\u021beaua dvs.? Majoritatea routerelor pentru consumatori au NAT activat automat. Aceasta face ca IP-urile 192.168.0.x din re\u021beaua dvs. \u0219i permite dispozitivelor s\u0103 vorbeasc\u0103 \u00een continuare cu internetul. <\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Monitoriza\u021bi totul<\/strong> - <\/p>\n\n\n\n<p>Indiferent c\u00e2t de mult \u0219i ce implementa\u021bi pentru securitate - monitorizarea este esen\u021bial\u0103. C\u0103utarea de noi g\u0103uri, noi exploat\u0103ri \u0219i dezactivarea sau blocarea a ceea ce nu este necesar.  Monitorizarea ne permite, de asemenea, s\u0103 \u0219tim c\u00e2nd exist\u0103 un trafic anormal care ar indica o poten\u021bial\u0103 problem\u0103 sau dac\u0103 exist\u0103 o \u00eentrerupere. <\/p>\n\n\n\n<p>Sunt pur \u0219i simplu prea multe de acoperit \u00een ceea ce prive\u0219te securitatea re\u021belei \u0219i modul \u00een care ne-am securizat re\u021beaua. Exist\u0103 organiza\u021bii \u00eentregi (guvernamentale \u0219i de alt\u0103 natur\u0103) care dezvolt\u0103 metrici \u0219i standarde pentru manipularea \u0219i securitatea datelor. Am abordat doar c\u00e2teva dintre cele pe care le-am folosit \u0219i modalit\u0103\u021bile prin care le pute\u021bi implementa \u00een re\u021beaua dumneavoastr\u0103. Dac\u0103 sunte\u021bi foarte serios cu privire la securitatea re\u021belei dvs., nu ezita\u021bi s\u0103 ne contacta\u021bi \u0219i unul dintre membrii echipei noastre v\u0103 poate pune \u00een leg\u0103tur\u0103 cu un consultant pentru a implementa cele mai bune practici pentru re\u021beaua dvs. <\/p>","protected":false},"excerpt":{"rendered":"<p>&#8220;How secure is your network?&#8221; We&#8217;ve had the question asked a few times, so we figured it was appropriate to write a blog post about it. Without going into alot of technical details, I will highlight standard security practices and how you can implement them in your own home network. Segregating our network &#8211; We [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":443,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-440","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting a Network | CIRCLE CITY INTERNET<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.circlecityinternet.com\/ro\/our-ramblings\/protecting-a-network\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting a Network | CIRCLE CITY INTERNET\" \/>\n<meta property=\"og:description\" content=\"&#8220;How secure is your network?&#8221; We&#8217;ve had the question asked a few times, so we figured it was appropriate to write a blog post about it. Without going into alot of technical details, I will highlight standard security practices and how you can implement them in your own home network. Segregating our network &#8211; We [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.circlecityinternet.com\/ro\/our-ramblings\/protecting-a-network\/\" \/>\n<meta property=\"og:site_name\" content=\"CIRCLE CITY INTERNET\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/circlecityinternet\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-18T17:15:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-23T04:07:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.circlecityinternet.com\/wp23\/wp-content\/uploads\/2024\/05\/Network-security-monitoring-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"robadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"robadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/our-ramblings\\\/protecting-a-network\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/our-ramblings\\\/protecting-a-network\\\/\"},\"author\":{\"name\":\"robadmin\",\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/#\\\/schema\\\/person\\\/635fb45dc97beefe9927802f6a466b46\"},\"headline\":\"Protecting a Network\",\"datePublished\":\"2024-05-18T17:15:12+00:00\",\"dateModified\":\"2024-05-23T04:07:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/our-ramblings\\\/protecting-a-network\\\/\"},\"wordCount\":921,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/our-ramblings\\\/protecting-a-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.circlecityinternet.com\\\/wp23\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Network-security-monitoring-scaled.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.circlecityinternet.com\\\/our-ramblings\\\/protecting-a-network\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/our-ramblings\\\/protecting-a-network\\\/\",\"url\":\"https:\\\/\\\/www.circlecityinternet.com\\\/our-ramblings\\\/protecting-a-network\\\/\",\"name\":\"Protecting a Network | CIRCLE CITY INTERNET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/our-ramblings\\\/protecting-a-network\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/our-ramblings\\\/protecting-a-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.circlecityinternet.com\\\/wp23\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Network-security-monitoring-scaled.jpg\",\"datePublished\":\"2024-05-18T17:15:12+00:00\",\"dateModified\":\"2024-05-23T04:07:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/our-ramblings\\\/protecting-a-network\\\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.circlecityinternet.com\\\/our-ramblings\\\/protecting-a-network\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/our-ramblings\\\/protecting-a-network\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.circlecityinternet.com\\\/wp23\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Network-security-monitoring-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.circlecityinternet.com\\\/wp23\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Network-security-monitoring-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/our-ramblings\\\/protecting-a-network\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.circlecityinternet.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting a Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/#website\",\"url\":\"https:\\\/\\\/www.circlecityinternet.com\\\/\",\"name\":\"Circle City Internet\",\"description\":\"Reliable Fiber Internet for Rural Arizona\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.circlecityinternet.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/#organization\",\"name\":\"Circle City Internet\",\"url\":\"https:\\\/\\\/www.circlecityinternet.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.circlecityinternet.com\\\/wp23\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Logo-bizcards-centered_filled.png\",\"contentUrl\":\"https:\\\/\\\/www.circlecityinternet.com\\\/wp23\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Logo-bizcards-centered_filled.png\",\"width\":801,\"height\":796,\"caption\":\"Circle City Internet\"},\"image\":{\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/circlecityinternet\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.circlecityinternet.com\\\/#\\\/schema\\\/person\\\/635fb45dc97beefe9927802f6a466b46\",\"name\":\"robadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8e81f6e60b1ba91dad63a1d68c350cf5a90941bfb66602c5fe888a3920011633?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8e81f6e60b1ba91dad63a1d68c350cf5a90941bfb66602c5fe888a3920011633?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8e81f6e60b1ba91dad63a1d68c350cf5a90941bfb66602c5fe888a3920011633?s=96&d=mm&r=g\",\"caption\":\"robadmin\"},\"sameAs\":[\"https:\\\/\\\/www.circlecityinternet.com\\\/wp23\"],\"url\":\"https:\\\/\\\/www.circlecityinternet.com\\\/ro\\\/our-ramblings\\\/author\\\/robadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting a Network | CIRCLE CITY INTERNET","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.circlecityinternet.com\/ro\/our-ramblings\/protecting-a-network\/","og_locale":"ro_RO","og_type":"article","og_title":"Protecting a Network | CIRCLE CITY INTERNET","og_description":"&#8220;How secure is your network?&#8221; We&#8217;ve had the question asked a few times, so we figured it was appropriate to write a blog post about it. Without going into alot of technical details, I will highlight standard security practices and how you can implement them in your own home network. Segregating our network &#8211; We [&hellip;]","og_url":"https:\/\/www.circlecityinternet.com\/ro\/our-ramblings\/protecting-a-network\/","og_site_name":"CIRCLE CITY INTERNET","article_publisher":"https:\/\/facebook.com\/circlecityinternet","article_published_time":"2024-05-18T17:15:12+00:00","article_modified_time":"2024-05-23T04:07:03+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.circlecityinternet.com\/wp23\/wp-content\/uploads\/2024\/05\/Network-security-monitoring-scaled.jpg","type":"image\/jpeg"}],"author":"robadmin","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"robadmin","Timp estimat pentru citire":"4 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.circlecityinternet.com\/our-ramblings\/protecting-a-network\/#article","isPartOf":{"@id":"https:\/\/www.circlecityinternet.com\/our-ramblings\/protecting-a-network\/"},"author":{"name":"robadmin","@id":"https:\/\/www.circlecityinternet.com\/#\/schema\/person\/635fb45dc97beefe9927802f6a466b46"},"headline":"Protecting a Network","datePublished":"2024-05-18T17:15:12+00:00","dateModified":"2024-05-23T04:07:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.circlecityinternet.com\/our-ramblings\/protecting-a-network\/"},"wordCount":921,"commentCount":0,"publisher":{"@id":"https:\/\/www.circlecityinternet.com\/#organization"},"image":{"@id":"https:\/\/www.circlecityinternet.com\/our-ramblings\/protecting-a-network\/#primaryimage"},"thumbnailUrl":"https:\/\/www.circlecityinternet.com\/wp23\/wp-content\/uploads\/2024\/05\/Network-security-monitoring-scaled.jpg","articleSection":["Security"],"inLanguage":"ro-RO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.circlecityinternet.com\/our-ramblings\/protecting-a-network\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.circlecityinternet.com\/our-ramblings\/protecting-a-network\/","url":"https:\/\/www.circlecityinternet.com\/our-ramblings\/protecting-a-network\/","name":"Protecting a Network | CIRCLE CITY INTERNET","isPartOf":{"@id":"https:\/\/www.circlecityinternet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.circlecityinternet.com\/our-ramblings\/protecting-a-network\/#primaryimage"},"image":{"@id":"https:\/\/www.circlecityinternet.com\/our-ramblings\/protecting-a-network\/#primaryimage"},"thumbnailUrl":"https:\/\/www.circlecityinternet.com\/wp23\/wp-content\/uploads\/2024\/05\/Network-security-monitoring-scaled.jpg","datePublished":"2024-05-18T17:15:12+00:00","dateModified":"2024-05-23T04:07:03+00:00","breadcrumb":{"@id":"https:\/\/www.circlecityinternet.com\/our-ramblings\/protecting-a-network\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.circlecityinternet.com\/our-ramblings\/protecting-a-network\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.circlecityinternet.com\/our-ramblings\/protecting-a-network\/#primaryimage","url":"https:\/\/www.circlecityinternet.com\/wp23\/wp-content\/uploads\/2024\/05\/Network-security-monitoring-scaled.jpg","contentUrl":"https:\/\/www.circlecityinternet.com\/wp23\/wp-content\/uploads\/2024\/05\/Network-security-monitoring-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.circlecityinternet.com\/our-ramblings\/protecting-a-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.circlecityinternet.com\/"},{"@type":"ListItem","position":2,"name":"Protecting a Network"}]},{"@type":"WebSite","@id":"https:\/\/www.circlecityinternet.com\/#website","url":"https:\/\/www.circlecityinternet.com\/","name":"Circle City Internet","description":"Fiabil Fiber Internet pentru Arizona rural","publisher":{"@id":"https:\/\/www.circlecityinternet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.circlecityinternet.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/www.circlecityinternet.com\/#organization","name":"Circle City Internet","url":"https:\/\/www.circlecityinternet.com\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.circlecityinternet.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.circlecityinternet.com\/wp23\/wp-content\/uploads\/2025\/08\/Logo-bizcards-centered_filled.png","contentUrl":"https:\/\/www.circlecityinternet.com\/wp23\/wp-content\/uploads\/2025\/08\/Logo-bizcards-centered_filled.png","width":801,"height":796,"caption":"Circle City Internet"},"image":{"@id":"https:\/\/www.circlecityinternet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/circlecityinternet"]},{"@type":"Person","@id":"https:\/\/www.circlecityinternet.com\/#\/schema\/person\/635fb45dc97beefe9927802f6a466b46","name":"robadmin","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/secure.gravatar.com\/avatar\/8e81f6e60b1ba91dad63a1d68c350cf5a90941bfb66602c5fe888a3920011633?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8e81f6e60b1ba91dad63a1d68c350cf5a90941bfb66602c5fe888a3920011633?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8e81f6e60b1ba91dad63a1d68c350cf5a90941bfb66602c5fe888a3920011633?s=96&d=mm&r=g","caption":"robadmin"},"sameAs":["https:\/\/www.circlecityinternet.com\/wp23"],"url":"https:\/\/www.circlecityinternet.com\/ro\/our-ramblings\/author\/robadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.circlecityinternet.com\/ro\/wp-json\/wp\/v2\/posts\/440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.circlecityinternet.com\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.circlecityinternet.com\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.circlecityinternet.com\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.circlecityinternet.com\/ro\/wp-json\/wp\/v2\/comments?post=440"}],"version-history":[{"count":4,"href":"https:\/\/www.circlecityinternet.com\/ro\/wp-json\/wp\/v2\/posts\/440\/revisions"}],"predecessor-version":[{"id":446,"href":"https:\/\/www.circlecityinternet.com\/ro\/wp-json\/wp\/v2\/posts\/440\/revisions\/446"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.circlecityinternet.com\/ro\/wp-json\/wp\/v2\/media\/443"}],"wp:attachment":[{"href":"https:\/\/www.circlecityinternet.com\/ro\/wp-json\/wp\/v2\/media?parent=440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.circlecityinternet.com\/ro\/wp-json\/wp\/v2\/categories?post=440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.circlecityinternet.com\/ro\/wp-json\/wp\/v2\/tags?post=440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}