Summary


This concludes our discussion of the fundamentals of perimeter design. In the course of this chapter, we talked about the need to carefully examine our environment before jumping into design. Also, by spending time in the planning stages of the deployment, we minimize late changes to the network's architecture, thus saving time and money. Business needs drive all security requirements in the real world, and we must understand our goals and requirements before deciding what traffic should be blocked at the border and how many firewalls should be deployed. Recognizing that organizations differ in their business needs, we discussed several popular building block patterns and explained their advantages and disadvantages. We will use these principles in the upcoming chapters to empower you to create a robust network perimeter that meets your security and business needs.



    Inside Network Perimeter Security
    Inside Network Perimeter Security (2nd Edition)
    ISBN: 0672327376
    EAN: 2147483647
    Year: 2005
    Pages: 230

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net