Focus on details tailored to the firewall layout

Source: Internet
Author: User
Tags end firewall

Define the defensive capabilities that are required

The level of monitoring, redundancy, and control of firewalls needs to be defined. Through the design of enterprise system policies, IT staff determine the level of risk acceptable to the enterprise (how paranoid it is). The IT staff then needs to list a list of what transmissions must be monitored, what traffic must be allowed, and what transmissions should be rejected. In other words, the IT staff first lists the overall goals, then combines the requirements analysis with the risk assessment, singling out the requirements that are always antagonistic to the risk and adding to the planned work list.

Focus on Financial Issues

Many experts suggest that an enterprise's IT staff can only discuss the problem in vague terms. However, it is important to try to quantify the proposed solution by how much it costs to purchase or implement the solution. For example, a high-end product with a full firewall could be worth 100,000 of dollars, while low-end products could be free; it could take months to build a high-end firewall from scratch. In addition, the system administration overhead is also a problem to consider. Building a home-grown firewall is good, but it is important that the firewall does not require high maintenance and update costs.

Reflect the enterprise's system strategy

It personnel need to understand that the post-installation firewall is intended to be explicitly rejected-except for all services that are critical to connecting to the network. Alternatively, the installed firewall provides a way to measure and audit access to "Marin" in a way that is not a threat. There is some degree of paranoia in these choices, and the final function of the firewall may be administrative results, not engineering decisions.

Network design

For practical purposes, the enterprise is concerned about the static transmission stream routing service between the router and its internal network. Therefore, based on this fact, a number of technical decisions need to be made: the Transport Stream routing service can be implemented at the IP layer through filtering rules such as routers, or through proxy gateways and services at the application layer.

The decision the IT staff needs to make is whether to place the exposed improvised machines on the external network to run proxy services for Telnet, FTP, news, etc., or to set up a shielded router such as a filter to allow communication with one or more internal computers. Both approaches have advantages and disadvantages, and agents can provide a higher level of audit and potential security, but at the expense of increased configuration costs and lower levels of service delivery.



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.