This is a good idea and common best practice at many co-location facilities.
The facility will run its own firewall and filtering routers. So providing
your own firewall on top of that allows you to be to provide an extra layer
of security between you and one of the co-location facilities other customer
servers.
Ken
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Danny Zak
Sent: Thursday, February 22, 2001 7:12 AM
To: [EMAIL PROTECTED]
Subject: Fwd: topics about firewalls : always if YOU are running a
private & public network ?
Hello,
I was reading the faq, but it discusses the topic mainly about
seperating a private network for the public.
If for example ..
I would buy a RACK in a co-location facility.. is it necessary
for installing a firewall between the local infrastructure and
my servers ?
Main issue is to filter "EVIL" packets before they reach the
main servers.. To prevent ICMP attacks,etc..
There is NO local network attached to the servers, since the
servers are dedicated for webserving, mailserving, etc...
Our local network is attached via a other dedicated line (so NOT
at this collocation facility)
Best regards,
Danny Zak mailto:[EMAIL PROTECTED]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]