Eicon Networks S92 Bedienungsanleitung Seite 30

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 209
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 29
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 30
DesignPrinciple
AsmentionedbyLanceSpitznerinhisarticleBuildingYourFirewallRulebase”,
securitypolicydefineswhatistobeenforced
2
.
Thefirewallisatoolfordefininghowthesecuritypolicyisenforced.Beforewe
implementanyfirewallsolution,thesecuritypolicymustfirstbeclearlydefined.As
Lancesaid,thekeytosuccessissimplicity.Complicatedpolicygivesroomto
misconfiguration.
Firewallrulebasesfollowandimplementthedefinedsecuritypolicies.Forevery
rulebase,theprincipleisstraightforward–anythingnotexplicitlyallowedbyaruleis
rejectedbydefault.Thiswaytherulebasecanbekeptassimpleaspossiblewithout
theneedtointroducetonsofcomplicated(andpossiblyconflicting)rules.
Layered Architecture
Itisnotpossibletoencompassprotectionofallsortsforeverysegmentintoasingle
firewall.TheGIAC’snetworkdeploysalayeredprotectionarchitecture,meaning
differentfirewallsareimplementedatdifferentpointsofthenetwork.Theentire
networkissecuredwhentheappropriatesecuritypoliciesareallocatedtothe
appropriatefirewallsuchthateverycornerofthenetworkissecured.
Toimplementthissecurityarchitecture,weneedto:
1. defineoverallsecuritypoliciesfortheenterprisebasedonitstechnical
requirements
2. allocateenforcementdutiestothefirewalls
3. oneveryfirewall,definespecificrulesandsettingsforpolicyenforcement
2
http://www.enteract.com/~lspitz/rules.html
Seitenansicht 29
1 2 ... 25 26 27 28 29 30 31 32 33 34 35 ... 208 209

Kommentare zu diesen Handbüchern

Keine Kommentare