Chapter 19. Maintaining a Security Perimeter

Welcome to Part IV, “Maintaining and Monitoring Perimeter Security.” In Part I, “The Essentials of Network Perimeter Security,” and Part II, “Fortifying the Security Perimeter,” we talked about the primary components of the defense perimeter, such as firewalls, routers, hosts, intrusion detection systems (IDSs), intrusion prevention systems (IPSs), Virtual Private Networks (VPNs), and policies. In Part III, “Designing a Secure Network Perimeter,” you learned how to deploy these elements according to their strengths while taking into account their weaknesses to create a unified defense architecture. After your security perimeter has been set up, two processes must continuously take place: administration ...

Get Inside Network Perimeter Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.