5.7. Topologies for Securing Networks

The way that a network is laid out can greatly influence the vulnerability of that network. For a firewall to be effective, you must ensure that an attacker cannot simply “walk around” the barrier presented by the firewall. In other words, the firewall must be the only entry point to your network. Many breaches in corporate networks occur because someone connects a laptop that has been infected with a virus while connected to a home Internet connection. Allowing systems on the intranet to make modem connections has similar potential for disaster.

You can employ a number of possible layouts to make a network more secure, or more flexible. However flexibility and security are mutually incompatible, and you ...

Get Sun Certified Enterprise Architect for J2EE™ Technology Study Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.