Firewall architecture decisions: perimeter protection strategy

This tip serves as a brief primer on firewall architectures to enable you to select an appropriate architecture for use in various situations.

When designing a firewall topology for your customer's network, you have three basic options. This tip is a brief primer on firewall architectures to enable you to select an appropriate architecture for use in various situations.

 

Choosing the right firewall topology: Bastion host, screened subnet or dual firewalls

Anyone building a perimeter protection strategy should plan to implement a defense-in-depth approach that utilizes multiple security devices including firewalls, border routers with packet filtering and intrusion-detection systems. One of the most common questions is, "Where should I place firewalls for maximum effectiveness?"

  1. Bastion host
  2. Screened subnet
  3. Dual firewalls

Learn more about firewall topologies and picking a perimeter protection strategy best suited to your customer's network.

Get more tips on building a firewall architecture.


 

This was first published in June 2007

Dig deeper on Network security products, technologies, services

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchConsumerization

SearchDataManagement

SearchBusinessAnalytics

Close