4.7. Approaches for securing e-business solutions
This section summarizes the security solutions using the architectures described in 4.5, “Techniques for securing the end-to-end model” on page 120.
4.7.1. Securing e-business using packet filtering and application firewalls
In the scenario illustrated in Figure 4-24, there is a business requirement to provide external access to enterprise data and applications.
Figure 4-24. Hosting solution using packet filtering and application proxies
In this scenario, the security and management requirements include:
Address hiding to provide a level of confidentiality
Protecting the integrity of the enterprise ...