Chapter 12. Fundamentals of Secure Perimeter Design
If you are not currently the lead designer for your organization, we suspect that becoming one is one of your goals. You might be laying out a network from scratch, assessing the strength of an existing infrastructure, determining where to place a new security device, or deciding whether to deploy one at all. You know of many defense components you could incorporate into your security infrastructure, and you know of countless ways of arranging them. This chapter concentrates on the do's and don'ts of security perimeter design and covers some of the more common scenarios.
Before jumping into a design session, you need to have the right tools for making design-related decisions. In the world of ...
Get Inside Network Perimeter Security, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.