It's the same concept as layered pastries. You take your firewall, roll it,
fold it, roll it again, and then smother it in rich, creamery butter...


Mmmmm. Butter.



Or, a much more boring definition is a situation where you might have a
packet screening router at the edge, then a DMZ, then an application proxy
firewall, then a services zone which contains general user PCs or something,
then a custom written front end to a database farm in a secure subnet. Or
something.

I think the conventional wisdom is to mix platforms, firewalling types,
hardware / software solutions etc. The idea is not only to give yourself
more cover, but also to avoid a situation where multiple firewalls might be
vulnerable to a shared vulnerability (five BSD firewalls are no good if the
same TCP/IP stack implementation bug works on all of them).

--
Ben Nagy
Network Consultant, CPM&S Group of Companies
Direct: +61 8 8422 8319            Mobile: +61 414 411 520


> -----Original Message-----
> From: Magowan, Richard M. (ITS) [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, July 22, 1999 6:37 AM
> To: '[EMAIL PROTECTED]'
> Subject: Layered Firewalls
> 
> 
> Hi All,
> Recently someone put a bug in management's ear here regarding 
> "layered"
> firewalls. I am not familiar with this term. Logically I 
> think of a layered
> approach where say you might run a PIX Firewall to the ISP, 
> maybe have a
> Checkpoint firewall in front of the PIX to do different 
> filtering etc. Or am
> I completely wrong and does the term "layered firewall" 
> define some firewall
> architecture I haven't heard of. Any advise/links are 
> appreciated. Thanks.
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to