O'Reilly logo

Network Security, Firewalls, and VPNs by J. Michael Stewart

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Firewall Deployment Considerations

FIREWALLS CAN BE COMPLEX security solutions. Plan the deployment of a firewall carefully, whether it's for a small home office or a large corporation. Evaluate as many firewall deployment considerations as possible before ramping up.

Make a clear determination as to what types of traffic you will allow to cross the network border and which types you want to block. Evaluate common security strategies. They include security through obscurity, principle of least privilege, simplicity, defense-in-depth, defense diversity, choke point, weakest link, fail safe, and forced universal participation. Determine which strategies you want to use and integrate them into the organization's security policy and its ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required