5.9. Firewall Deployment

You have selected a firewall product. Now the big question is how it should be placed within your network environment. Although opinions vary, the most common deployment is shown in Figure 5.13.

Figure 5.13. Where to place your firewall
Table 5.6. Popular firewall products compared by price, feature, and platform
NameServices (Static/Dynamic/Stateful/Proxy)Operating Systems (or Appliance)Address translationFirewall logging and analysisVPNSIntrusion Detection and ResponseIntegration and access controlload Sharing and Fail OverOther services (including integrated third party tools)
Microsoft ISAAll (including application ...

Get Mastering™ Network Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.