Re: [fw-wiz] How should an Internet connection/firewall be designed?

Cisco safe docuements is a good guide in my oppinion as to how to protect different size networks, and networks with different services. ( btw: I don't work for Cisco )

AMuse <amuse@xxxxxxxxxx> wrote:

How many companies have two serial firewalls from different vendors?

How many companies have an IPS/deep-packet-inspection device between the
firewall and the border router?

How many companies still use IDS?

How many companies have some form of deep packet inspection device in
front of their DMZ web servers? What do they use?

My guess to all four questions above would be "Few small companies, some
medium sized companies, many large companies and very many government

It seems like the added complexity and multiple devices will increase
management costs and may actually decrease security and reliability.
Our current design may be rather simple but in over 12 years we have had
less than a couple of hours of down time and have not had a detected
breakin to our internal network.

In general, I believe all added complexity increases management costs
and, if poorly managed, may decrease security and reliability. The
question is what is your budget, what's the trade-offs between security
and availability, and what is the data worth to you compared to the above?

Incidentally, not having a detected break-in to the internal network is
not a great yardstick for how good your security is. For instance, a
small company with no analysts might have a dozen attackers rootkitting
them and not know it. :)

I would appreciate any comments.

Thank you,

Dave Kaas
firewall-wizards mailing list
firewall-wizards mailing list

Everyone is raving about the all-new Yahoo! Mail beta._______________________________________________
firewall-wizards mailing list