
Different Types of Office Requirements
Thông tin tài liệu:
Nội dung trích xuất từ tài liệu:
Different Types of Office RequirementsDifferent Types of Office RequirementsAlthough every firewall implementation is truly unique, a couple of fundamental designsfrom which virtually all firewall designs are created. The first question to ask whenimplementing a firewall is whether the firewall is going be located at a central location ora remote location. When you have answered that question, you need to examine theresources that need to be protected. With that in mind, the next step is to determine howmany demilitarized zones (DMZs), if any, need to be implemented.Although most of these design questions are based on protecting internal resources, theyshould be equally applied to the question of how the firewall will screen Internet accessfor your internal resources, essentially protecting the Internet from your systems, while atthe same time enabling you to restrict and filter the kinds of Internet-based traffic thatwill be allowed from your internal resources.Central OfficeAlthough referred to as a central office implementation, the key to this implementation isnot necessarily that it exists at the central office. Rather, the central officeimplementation refers to an implementation that has a number of common elements: • A concentration of resources must be protected by the firewall. • A significant number of internal users need access to external resources through the firewall (for example, if the firewall handles the majority of the companys Internet access). • Technical personnel can actively monitor and manage the firewall because they are physically located at the same location.As a result, the central office implementation is applicable in any environment thatmatches these elements. For example, many large companies have multiple locations thatwould all warrant the central office design, because there may be two or more hublocations with a high concentration of users, resources, and administrators.The central office implementation is highlighted by an implementation that tends to bemore complex than the remote office implementation and tends to utilize higher endhardware and software to achieve the objective of protecting resources. For example, thecentral office may utilize multiple firewalls in a dual-firewall implementation to protectresources and may have multiple firewalls implemented in a task-specific fashion. Youmight have a separate Internet-screening firewall, web-application firewall, and e-mail-filtering firewall.Central office implementation are also frequently underpinned by more advancedfirewallssuch as Cisco Secure PIX Firewalls, NetScreen, Check Point, or Microsoft ISAServeras opposed to smaller Network Address Translation (NAT) routers or smalloffice/home office (SOHO) firewall products.As a general rule, the central office implementation tends to provide for the mosthardened and secure firewall implementation.Remote OfficeThe remote office implementation tends to revolve around a more simple, point solutiondesign. As opposed to the central office, remote offices typically have few technicalresources at the location with the expertise required to effectively manage and maintain afirewall. Remote offices also rarely have internal resources that must be accessed byremote sources, which means that often the firewall implementation is little more than anInternet-screening firewall, keeping all Internet sources from accessing internal resourcesand restricting Internet access by internal resources.Although the central office implementation lends itself to protecting literally thousands ofusers and resources, the remote office implementation is really only effective atprotecting a relatively small number of users and resources, generally fewer than 100users and resources. Consequently, the remote office implementation lends itself to theuse of SOHO firewall solutions ranging from lower-end firewalls such as the Cisco PIX506E, NetScreen 5, or NetScreen 25 all the way down to the basic NAT filtering routerssuch as some of the Linksys or D-Link product lines.
Tìm kiếm theo từ khóa liên quan:
công nghệ thông tin an ninh bảo mật fire wall tường lửa Fire wall fundamentals Different Types of Office RequirementsTài liệu có liên quan:
-
52 trang 465 1 0
-
Top 10 mẹo 'đơn giản nhưng hữu ích' trong nhiếp ảnh
11 trang 366 0 0 -
96 trang 333 0 0
-
74 trang 329 0 0
-
Đồ án tốt nghiệp: Xây dựng ứng dụng di động android quản lý khách hàng cắt tóc
81 trang 318 0 0 -
Tài liệu dạy học môn Tin học trong chương trình đào tạo trình độ cao đẳng
348 trang 318 1 0 -
Báo cáo thực tập thực tế: Nghiên cứu và xây dựng website bằng Wordpress
24 trang 303 0 0 -
Tài liệu hướng dẫn sử dụng thư điện tử tài nguyên và môi trường
72 trang 300 0 0 -
EBay - Internet và câu chuyện thần kỳ: Phần 1
143 trang 292 0 0 -
64 trang 290 0 0
-
Bài giảng An toàn và bảo mật thông tin - Trường đại học Thương Mại
31 trang 271 0 0 -
47 trang 262 0 0
-
LUẬN VĂN: TÌM HIỂU PHƯƠNG PHÁP HỌC TÍCH CỰC VÀ ỨNG DỤNG CHO BÀI TOÁN LỌC THƯ RÁC
65 trang 260 0 0 -
Giáo trình Hệ điều hành: Phần 2
53 trang 254 0 0 -
63 trang 230 0 0
-
Giáo trình Autocad - Nghề: Quản trị mạng máy tính - Trình độ: Cao đẳng nghề (Phần 2)
52 trang 229 0 0 -
83 trang 227 0 0
-
69 trang 225 0 0
-
Các phương pháp nâng cấp cho Windows Explorer trong Windows
5 trang 224 0 0 -
BÀI GIẢNG KINH TẾ CHÍNH TRỊ MÁC - LÊNIN - TS. NGUYỄN VĂN LỊCH - 5
23 trang 224 0 0