The Result of Network Evolution

To protect their business assets, corporations usually deploy many of the following tools:

  • Firewalls to screen out unwanted traffic.

  • Virus scanners.

  • Web proxies to provide accessibility only to approved websites while preventing access to non-approved sites.

  • DMZs to provide secure ecommerce to the Internet at large while protecting the corporate network.

  • VPNs to provide secure remote access to corporate networks.

A typical deployment for a network is depicted in Figure 8-5. Note that two firewalls are used in this deployment in order to provide two levels of security, one for the DMZ systems behind the external firewall and even greater security for hosts behind the second firewall. The external firewall is not as ...

Get HIGH-TECH CRIMES REVEALED: CYBERWAR STORIES FROM THE DIGITAL FRONT now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.