Howard,
Comments imbedded:
On 29 Mar 2001, at 13:04, Howard C. Berkowitz wrote:
> > There should also be no way for
> >an untrusted network to bypass your firewall, which there is in this
> >design.
>
>
> Kent, I'd be interested in your opinion about an approach I've
> increasingly used.
At 9:17 AM -0800 3/29/01, [EMAIL PROTECTED] made some very
interesting points:
>Murat,
>
>My comment is don't do this. It violates a very fundamental
>principal of network security, "keep your untrusted and your trusted
>networks physically separated".
In the classified world with RED/BLACK is
to keep traffic separated.
If it's in your office, the PIX would go there.
Let me know what you're trying to accomplish and I'll be glad to help you
out.
Allen
- Original Message -
From: "Murat Kirmaci" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursd
Murat,
My comment is don't do this. It violates a very fundamental
principal of network security, "keep your untrusted and your trusted
networks physically separated". There should also be no way for
an untrusted network to bypass your firewall, which there is in this
design.
There are l
Hello Everybody,
I would like to learn if I have got a Cisco router connected to frame relay
network and over this frame relay network there are connections to their
remote offices and another pvc to the INTERNET (not a seperate leased line),
in addition to this also I have to insert a PIX firewal
5 matches
Mail list logo