10.6 Summary

   

Firewalls and intrusion detection systems make an excellent perimeter protection combination. Each has different strengths that, when combined, can make a powerful warning system for the network.

Unfortunately, both devices require a lot of maintenance to make sure they are performing at peak efficiency, and that they are behaving in a manner that aligns with the expectations of the network administrators. A bad firewall rule or a missed signature can leave a network open to attack.

It is important to avoid the trap of over reliance on these two devices as the sole means of network protection. Firewalls and intrusion detection systems should be part of a strong security plan that includes regular audits ; and it should not be the entire security plan.

   


The Practice of Network Security. Deployment Strategies for Production Environments
The Practice of Network Security: Deployment Strategies for Production Environments
ISBN: 0130462233
EAN: 2147483647
Year: 2002
Pages: 131
Authors: Allan Liska

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net