
Introduction
Imagine a world without any rules, regulations, or consequences; where everyone
did exactly what they wanted to do, when they wanted to do it. It would be dan-
gerous and chaotic; nothing would be safe.
Networks live in a similar world. Even though laws have been passed, new regu-
lations are being enforced, and the consequences are more severe, networks are still
being scanned daily for weaknesses. A single weak point in your perimeter defense
can cause you to lose valuable data.
This chapter covers the components that access rules require, and covers how to
best plan, implement, and maintain a secure set of rules to protect your pri