O'Reilly logo

Designing Network Security Second Edition by Merike Kaeo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Securing Internet Access

This chapter examines how to secure Internet access to the corporate network. You can create such security by using some type of firewall functionality and securing the infrastructure devices, as discussed in the previous chapter, that interface with the Internet. Firewalls have become an integral component of perimeter network access, such as the boundary between the trusted corporate network and the less-trusted Internet. On this perimeter, traffic can be analyzed and controlled according to parameters such as specific applications, addresses, and users for both incoming traffic from remote users and outgoing traffic to the Internet.

NOTE

Constructing a firewall policy for your corporate environment was discussed ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required