Chapter 10. Securing Internet Access
This chapter examines how to secure Internet access to the corporate network. You can create such security by using some type of firewall functionality and securing the infrastructure devices, as discussed in the previous chapter, that interface with the Internet. Firewalls have become an integral component of perimeter network access, such as the boundary between the trusted corporate network and the less-trusted Internet. On this perimeter, traffic can be analyzed and controlled according to parameters such as specific applications, addresses, and users for both incoming traffic from remote users and outgoing traffic to the Internet.
NOTE
Constructing a firewall policy for your corporate environment was discussed ...
Get Designing Network Security Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.