Chapter 18. Sample Designs
Let's put together all the security design information presented in Part III, “Designing a Secure Network Perimeter.” Each chapter has presented a substantial amount of material you must incorporate into your designs to ensure they reflect the needs of your organization. As we have discussed, designing a secure network perimeter requires you to achieve a balance between conflicting factors, such as security, performance, and usability. For example, deciding to use 3DES encryption on a VPN implemented using low-end routers might provide the best protection for the connection, but the performance impact caused by the encryption might reduce performance unacceptably. In other instances, it might be difficult to determine ...
Get Inside Network Perimeter Security, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.