Page 820 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 820
device deployment, such as devices always deployed in parallel or
in series? Is the exterior of a device usually sufficient to indicate its
function, or must you look up its model number?
LAN Extenders A LAN extender is a remote access, multilayer
switch used to connect distant networks over WAN links. This is a
strange beast of a device in that it creates WANs, but marketers of this
device steer clear of the term WAN and use only LAN and extended
LAN. The idea behind this device was to make the terminology easier
to understand and thus make the product easier to sell than a normal
WAN device with complex concepts and terms tied to it. Ultimately, it
was the same product as a WAN switch or WAN router.
While managing network security with filtering devices
such as firewalls and proxies is important, we must not overlook
the need for endpoint security. Endpoints are the ends of a
network communication link. One end is often at a server where a
resource resides, and the other end is often a client making a
request to use a network resource. Even with secured
communication protocols, it is still possible for abuse, misuse,
oversight, or malicious action to occur across the network because
it originated at an endpoint. All aspects of security from one end to
the other, often called end-to-end security, must be addressed. Any
unsecured point will be discovered eventually and abused.

