5.9. Firewall Deployment
You have selected a firewall product. Now the big question is how it should be placed within your network environment. Although opinions vary, the most common deployment is shown in Figure 5.13.
Figure 5.13. Where to place your firewall
|Name||Services (Static/Dynamic/Stateful/Proxy)||Operating Systems (or Appliance)||Address translation||Firewall logging and analysis||VPNS||Intrusion Detection and Response||Integration and access control||load Sharing and Fail Over||Other services (including integrated third party tools)|
|Microsoft ISA||All (including application ...|