Again...

Having a console server is indeed an option, but a pain in the neck when it comes to 
changing configurations.

How about changing a policy that is shared by 100 firewalls, making the changes via 
the console will take quite a bit of time, 
or very intelligent scripting :)
It costs me only 2 clicks with the mouse and all my bridged firewalls are updated no 
matter where they are and if they are 
currently available.
(after changing 1 policy of course)

The real difference with routed and bridged firewalls is that bridged firewalls have 
their interfaces in promiscuous mode and 
therefore do not even show up in MAC tables, except for when management tarffic is 
going back and forth between the management 
station and firewall.

Bridged firewalls do not need subnet based address assignment on their interfaces, you 
can have 10 interfaces with technically 
overlapping IP address ranges on all. An IP address that theoretically belongs to 
range A that is configured to be behind 
interface 2 can be placed on interface 5 etc. Adding a huge flexibility on DMZ 
creation, NATting etc.
Similar situations will require vast/intelligent routing on a routed firewall, link 
redundance without session loss is also 
extremely easy to setup using a bridged firewall, as long as the redundant link's 
traffic also passes through your firewall.

Another 2 cts.

        Greetings,

        Diederik
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to