Designing and implementing a customer's network firewall solution can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. In this series of tips, we take a detailed look at the process used to implement a firewall and help guide you through the design process.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
How to choose a firewall
There are dozens of firewalls on the market today. Choosing one for your customer's organization can be a daunting task -- especially in an industry filled with buzzwords and proprietary trademarks. Let's take a look at the basics of firewall technology and five questions you should ask when choosing a firewall for your organization.
- Why are you implementing a firewall?
- How will the firewall fit into your network topology?
- What type of traffic inspection do you need to perform?
- Is your organization better suited for an appliance or a software solution?
- What operating system is best suited for your requirements?
The process of answering these questions can help you solidify your thoughts and put you in the right direction. With these answers in hand, you should be able to intelligently evaluate the cost/benefit tradeoff for the various products available on the market today.
Get an expanded list of questions to consider when choosing firewalls for your customers.
Choosing the right firewall topology
When developing a perimeter protection strategy for an organization, one of the most common questions is: "Where should I place firewalls for maximum effectiveness?" In this tip, we'll take a look at the three basic options and analyze the scenarios best suited for each case.
- Bastion host
- Screened subnet
- Dual firewalls
Learn more about firewall topologies and picking a perimeter protection strategy best suited to your customer's network.
Placing systems in a firewall topology
Once you have decided which topology best suits your IT infrastructure, you need to decide where to place individual systems within the chosen topology.
Each topology strategy raises its own questions about where your customers' systems should be placed and why. The answers to those questions rest largely in each customer's needs and plans.
Learn more about firewall strategies and how they affect your customers' network topologies.
Auditing firewall activity
In the real world of firewall management, we're faced with balancing a continuous stream of change requests and vendor patches against the operational management of our firewalls. Configurations change quickly and often, making it difficult to keep on top of routine maintenance tasks. Here are four practical areas where some basic log analysis can provide valuable firewall management data:
- Monitor rule activity
- Traffic flows
- Rule violations
- Denied probes
Get an expanded list of these four areas to concentrate on when auditing firewall activity on your customer's network.