5.9. Firewall Deployment
You have selected a firewall product. Now the big question is how it should be placed within your network environment. Although opinions vary, the most common deployment is shown in Figure 5.13.
Figure 5.13. Where to place your firewall
Name | Services (Static/Dynamic/Stateful/Proxy) | Operating Systems (or Appliance) | Address translation | Firewall logging and analysis | VPNS | Intrusion Detection and Response | Integration and access control | load Sharing and Fail Over | Other services (including integrated third party tools) |
---|---|---|---|---|---|---|---|---|---|
Microsoft ISA | All (including application ... |
Get Mastering™ Network Security, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.