Firewall Architectures
James E. Goldman, Purdue University
Brief Review of Firewall Functionality
Requirements Analysis for Firewall Architectures
Importance of Understanding Security Requirements
Clean Networks and Dirty Networks
Requirements versus Firewall Functionality
Enterprise Firewall Architectures
Conceptual Design Options of Firewall Architectures
Firewall Architecture Design Elements
Perimeter Firewall Architecture
Server/Host Firewall Architecture
Screened Subnet Firewall Architecture
Multitiered/Distributed DMZ Architecture
INTRODUCTION
When an organization or individual links to the Internet, it creates a two-way access point in and out of their information systems. To prevent unauthorized activities between the Internet and the private network, a specialized hardware, software, or software–hardware combination known as a firewall is often deployed.
Brief Review of Firewall Functionality
Firewall software often runs on a dedicated server between the Internet and the protected network. Firmware-based firewalls and single-purpose dedicated firewall appliances are situated in a similar location on a network and provide similar functionality to the software-based firewall. All network traffic entering the firewall is examined, ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.