Copyright by J. Michael Stewart

Safari, the world’s most comprehensive technology and business learning platform.

Find the exact information you need to solve a problem on the fly, or go deeper to master the technologies and skills you need to succeed

Start Free Trial

No credit card required

O'Reilly logo

Chapter 8. Firewall Deployment Considerations

FIREWALLS CAN BE COMPLEX security solutions. Plan the deployment of a firewall carefully, whether it's for a small home office or a large corporation. Evaluate as many firewall deployment considerations as possible before ramping up.

Make a clear determination as to what types of traffic you will allow to cross the network border and which types you want to block. Evaluate common security strategies. They include security through obscurity, principle of least privilege, simplicity, defense-in-depth, defense diversity, choke point, weakest link, fail safe, and forced universal participation. Determine which strategies you want to use and integrate them into the organization's security policy and its ...

Find the exact information you need to solve a problem on the fly, or go deeper to master the technologies and skills you need to succeed

Start Free Trial

No credit card required