| ||
Step | Description |
---|---|
Define your requirements. | Determine what you are protecting, what the performance requirements for your network are, and the level of security needed. This will help to select the appropriate technologies. |
Evaluate solutions. | Once you have defined your requirements, you now need to evaluate available solutions. Build a roster of vendors that you wish to consider based on the company as well as the technology. |
Deploy your firewall. | Once you have procured your solution, it is now a matter of deploying it. This chapter has outlined the steps, in principle, that will allow you to do that. |
RFC 2267
http://www.juniper.net/techpubs/software/junos/junos71/swconfig71-routing/html/routing-generic-config12.html
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsecur_c/fothersf/scfrpf.htm
| ||