Chapter 5: Securing the Perimeter

Overview

Your network's perimeter is the first line of defense against attacks and blended threats originating from the Internet. This chapter focuses specifically on the traditional network firewall, providing insight into the fundamental technologies used in modern firewalls. Its goal is to allow you to make an informed decision when selecting vendors and technologies to consider.

This chapter will provide information on the following:

  • Types of Firewall Technologies An overview of the types of firewall technologies that have emerged over the past decade . The inherent drawbacks and benefits of each type of firewall are given when applicable .

  • Firewall Deployment How to deploy your firewall once you have made a decision. The basic considerations that you must make when configuring your firewall are also addressed.



Extreme Exploits. Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net