Problem solve Get help with specific problems with your technologies, process and projects.

Firewall architecture decisions: perimeter protection strategy

This tip serves as a brief primer on firewall architectures to enable you to select an appropriate architecture for use in various situations.

When designing a firewall topology for your customer's network, you have three basic options. This tip is a brief primer on firewall architectures to enable you to select an appropriate architecture for use in various situations.

 

Choosing the right firewall topology: Bastion host, screened subnet or dual firewalls

Anyone building a perimeter protection strategy should plan to implement a defense-in-depth approach that utilizes multiple security devices including firewalls, border routers with packet filtering and intrusion-detection systems. One of the most common questions is, "Where should I place firewalls for maximum effectiveness?"

  1. Bastion host
  2. Screened subnet
  3. Dual firewalls

Learn more about firewall topologies and picking a perimeter protection strategy best suited to your customer's network.

Get more tips on building a firewall architecture.


 

This was last published in June 2007

Dig Deeper on Managed network security services

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

MicroscopeUK

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchDataManagement

SearchBusinessAnalytics

Close