CHAPTER 26

GATEWAY SECURITY DEVICES

David Brussin and Justin Opatrny

26.1 INTRODUCTION

26.1.1 Changing Security Landscape

26.1.2 Rise of the Gateway Security Device

26.1.3 Application Firewall: Beyond the Proxy

26.2 HISTORY AND BACKGROUND

26.2.1 Changing Network Models

26.2.2 Firewall Architectures

26.2.3 Firewall Platforms

26.3 NETWORK SECURITY MECHANISMS

26.3.1 Basic Roles

26.3.2 Personal and Desktop Agents

26.3.3 Additional Roles

26.4 DEPLOYMENT

26.4.1 Screened Subnet Firewall Architectures

26.4.2 Gateway Protection Device Positioning

26.4.3 Management and Monitoring Strategies

26.5 NETWORK SECURITY DEVICE EVALUATION

26.5.1 Current Infrastructure Limitations

26.5.2 New Infrastructure Requirements

26.5.3 Performance

26.5.4 Management

26.5.5 Usability

26.5.6 Price

26.5.7 Vendor Considerations

26.5.8 Managed Security Service Providers

26.6 CONCLUDING REMARKS

26.7 FURTHER READING

26.1 INTRODUCTION.

The firewall has come to represent both the concept and the realization of network and Internet security protections. Due to its rapid acceptance and evolution, the firewall has become the most visible of security technology throughout the enterprise chain of command. In distinct contrast with virtually any other single piece of technology, there is not likely to be a chief executive officer in this country who cannot say a word or two about how firewalls are used to protect enterprise systems and data.

The firewall, as originally devised, was intended to allow certain explicitly authorized ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.