Summary


A service can be categorized as either protected or unprotected based on the level of protection and type of access required.

When deploying protected services, a perimeter model based on dedicated firewall contexts and a fusion router provides the best flexibility and a centralized point of policy enforcement.

When you are deploying unprotected services, you can use many innovative routing scenarios to create communication between VNs and extranet connectivity. The fact that the services are labeled as unprotected does not mean that these cannot be protected by firewalls and other security mechanisms; it just means that the model does not intrinsically protect the services and that they would have to be secured by other means.

Certain services such as DHCP and DNS can be shared among the different VNs as long as the appropriate functionality is in place.




Network Virtualization
Network Virtualization
ISBN: 1587052482
EAN: 2147483647
Year: 2006
Pages: 128

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net