Just to remove this topic from that other thread about PIX clones, Patrick
R. brought up some good points in one of his posts.

Security design ( which is apparently NOT what cisco teaches or tests in
their security programs ) is a lot more than just closing ports and doing
NAT.

Many organizations have reason to segregate various pats of their network
from eachother. Financial institutions, medical organizations, insurance
companies, any operation that has information that is "need to know" has
reason to set up multiple security zones. We cover some of this thinking
when we talk about access-lists. Modern multiport firewalls take this to its
logical extreme in their design and philosophy.

for example, given a County School Board, which has an internet connection,
and permits multiple school districts to share that internet connection
through a WAN. Is it reasonable or rational, let alone good security
practice, to consider a two port firewall as adequate protection? ( three
port if there is a DMZ for, say, school web sites ) ????

how about a brokerage firm, where there are supposed to be "chinese walls"
between their sales, investment banking, and research operations?

what about any company with payroll, human resources, sales, "trade secret"
operations such as manufacturing or patent development?

With everyone become interconnected, it is more important than ever to study
security in terms of protecting assets, rather than filtering ports or
addresses. Identification of those assets is an integral part of the
process.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=36677&t=36677
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to