![Phân tích tư tưởng của nhân dân qua đoạn thơ: Những người vợ nhớ chồng… Những cuộc đời đã hóa sông núi ta trong Đất nước của Nguyễn Khoa Điềm](https://timtailieu.net/upload/document/136415/phan-tich-tu-tuong-cua-nhan-dan-qua-doan-tho-039-039-nhung-nguoi-vo-nho-chong-nhung-cuoc-doi-da-hoa-song-nui-ta-039-039-trong-dat-nuoc-cua-nguyen-khoa-136415.jpg)
Dual-Firewall Architecture
Số trang: 2
Loại file: pdf
Dung lượng: 26.58 KB
Lượt xem: 1
Lượt tải: 0
Xem trước 2 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
The dual-firewall architecture is more complex than the single-firewall architecture, but it is also a more secure overall design and provides for a much more granular level of control over traffic traversing the firewalls
Nội dung trích xuất từ tài liệu:
Dual-Firewall ArchitectureDual-Firewall ArchitectureThe dual-firewall architecture is more complex than the single-firewall architecture, but itis also a more secure overall design and provides for a much more granular level ofcontrol over traffic traversing the firewalls. This is because the architecture uses twofirewalls, ideally of different vendors and models, to act as exterior and interior firewallsproviding a DMZ segment between the two firewalls, as shown in Figure 9-3. Likeprevious designs, traffic is permitted into the DMZ segment as well as from the internalnetwork to the external network, but no traffic from the external network is permitteddirectly to the internal network. Figure 9-3. Dual-Firewall Architecture [View full size image]The granular control in a dual-firewall architecture comes from the fact that each firewallcontrols a subset of all the traffic entering and exiting a network. Because untrusted (thatis, external) traffic should never be allowed to directly access a trusted (that is, internal)network, the exterior firewall can be configured specifically to grant access to and fromthe DMZ segment and external systems. Similarly, the interior firewall can be configuredto grant access to and from the DMZ segment and internal resources. This allows for thecreation of two distinct and independent points of control of all traffic into and out of allcorporate network segments, whether they are DMZ segments or internal networksegments.When a dual-firewall architecture is implemented with different firewall models (forexample, a Cisco PIX Firewall and a Microsoft ISA Server firewall), you also gainadditional security because an attacker would need to compromise two separate firewalls(which will likely not be susceptible to the same attack methods) to gain access toprotected resources. In addition, an attacker also needs to be knowledgeable in theworkings of two different types of firewalls to tamper with the configurations.The downsides of a dual-firewall architecture relate to implementation complexity andcost. With regard to complexity, a dual-firewall architecture frequently requires someform of routing be implemented in the DMZ segment to allow resources in the DMZsegment to send external-destined traffic to the exterior firewall and internal-destinedtraffic to the interior firewall. Although many companies just use static routingstatements on the servers themselves, the larger the number of servers in the DMZ, themore difficult it becomes to manage and maintain so many routing statements. Whereasrouters can be used, allowing the administrator just to update the router with new routes,the use of routing protocols should be avoided, because an attacker can potentially usethe information provided by the routing protocol to gain insight regarding the internalnetwork topology and structure.Aside from the obvious costs related to implementing and maintaining multiple firewalls,it is also more expensive to implement and manage a dual-firewall architecture becauseyou need people who understand multiple firewall technologies.Because of the cost and complexity of the dual-firewall architecture, it is typicallyimplemented in environments with critical security requirements such as banking,government, finance, and larger medical organizations.
Nội dung trích xuất từ tài liệu:
Dual-Firewall ArchitectureDual-Firewall ArchitectureThe dual-firewall architecture is more complex than the single-firewall architecture, but itis also a more secure overall design and provides for a much more granular level ofcontrol over traffic traversing the firewalls. This is because the architecture uses twofirewalls, ideally of different vendors and models, to act as exterior and interior firewallsproviding a DMZ segment between the two firewalls, as shown in Figure 9-3. Likeprevious designs, traffic is permitted into the DMZ segment as well as from the internalnetwork to the external network, but no traffic from the external network is permitteddirectly to the internal network. Figure 9-3. Dual-Firewall Architecture [View full size image]The granular control in a dual-firewall architecture comes from the fact that each firewallcontrols a subset of all the traffic entering and exiting a network. Because untrusted (thatis, external) traffic should never be allowed to directly access a trusted (that is, internal)network, the exterior firewall can be configured specifically to grant access to and fromthe DMZ segment and external systems. Similarly, the interior firewall can be configuredto grant access to and from the DMZ segment and internal resources. This allows for thecreation of two distinct and independent points of control of all traffic into and out of allcorporate network segments, whether they are DMZ segments or internal networksegments.When a dual-firewall architecture is implemented with different firewall models (forexample, a Cisco PIX Firewall and a Microsoft ISA Server firewall), you also gainadditional security because an attacker would need to compromise two separate firewalls(which will likely not be susceptible to the same attack methods) to gain access toprotected resources. In addition, an attacker also needs to be knowledgeable in theworkings of two different types of firewalls to tamper with the configurations.The downsides of a dual-firewall architecture relate to implementation complexity andcost. With regard to complexity, a dual-firewall architecture frequently requires someform of routing be implemented in the DMZ segment to allow resources in the DMZsegment to send external-destined traffic to the exterior firewall and internal-destinedtraffic to the interior firewall. Although many companies just use static routingstatements on the servers themselves, the larger the number of servers in the DMZ, themore difficult it becomes to manage and maintain so many routing statements. Whereasrouters can be used, allowing the administrator just to update the router with new routes,the use of routing protocols should be avoided, because an attacker can potentially usethe information provided by the routing protocol to gain insight regarding the internalnetwork topology and structure.Aside from the obvious costs related to implementing and maintaining multiple firewalls,it is also more expensive to implement and manage a dual-firewall architecture becauseyou need people who understand multiple firewall technologies.Because of the cost and complexity of the dual-firewall architecture, it is typicallyimplemented in environments with critical security requirements such as banking,government, finance, and larger medical organizations.
Tìm kiếm theo từ khóa liên quan:
công nghệ thông tin an ninh bảo mật fire wall tường lửa Fire wall fundamentals Dual-Firewall ArchitectureTài liệu liên quan:
-
52 trang 442 1 0
-
Top 10 mẹo 'đơn giản nhưng hữu ích' trong nhiếp ảnh
11 trang 332 0 0 -
74 trang 310 0 0
-
96 trang 307 0 0
-
Báo cáo thực tập thực tế: Nghiên cứu và xây dựng website bằng Wordpress
24 trang 299 0 0 -
Đồ án tốt nghiệp: Xây dựng ứng dụng di động android quản lý khách hàng cắt tóc
81 trang 293 0 0 -
Tài liệu dạy học môn Tin học trong chương trình đào tạo trình độ cao đẳng
348 trang 291 1 0 -
EBay - Internet và câu chuyện thần kỳ: Phần 1
143 trang 279 0 0 -
Tài liệu hướng dẫn sử dụng thư điện tử tài nguyên và môi trường
72 trang 275 0 0 -
64 trang 272 0 0