<x-flowed>Here is my attempt at restating the problem.

Charles mentions the various tools in current use, like Seawall and 
the extended scripts and what is wrong with them. (Not easily 
extended and/or modified beyond their original limited purpose.)

Where I see the problem is that current routing/firewall design 
philosophy centers on the router. Instead the focus should be on 
subnets and how the various subnets in a network relate to each 
other. Then finally what routers are used to connect the subnets.

Take a real world problem like Charles' TX facility. You should be 
able to describe the TX facility (or any other network) to our 
hypothetical compiler as one unified specification. Then the compiler 
should be able to generate the firewall/routing rules for each and 
every router on the network, including the Cisco from the one unified 
specification.

At 08:30 PM 01/02/2001 -0600, Charles Steinkuehler wrote:
>4 DMZ networks firewalled from each other (some specific services 
>allowed)
>3 Internal networks firewalled from each other (again, sharing some 
>specific
>services)
>Appropriate connections between:
>   Internal networks and the DMZs
>   DMZs and the internet
>   Internal networks and the internet
>   remote networks and the internal networks (via VPN)
>
>This is actually a description of the TX facility, which is 
>implemented with
>3 LRP boxes and a Cisco router...


_______________________________________________
Leaf-devel mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/mailman/listinfo/leaf-devel
</x-flowed>

Reply via email to