Solved

"main firewall"

Posted on 2012-04-02
1
385 Views
Last Modified: 2012-08-13
I did a little reading on perimeter network security and the same phrase kept coming up, our "main firewall" is XYZ. Does that mean companies will utilise more than one perimeter firewall? If so - why, why would you use more than 1? Is there a danger of the firewall settings conflicting with each other and thus the admin not knowing whats in place? I dont understand why people would need/utilise more than 1 firewall - albeit its not my area of expertese.
0
Comment
Question by:pma111
1 Comment
 
LVL 4

Accepted Solution

by:
schmitty007 earned 500 total points
ID: 37796913
In a lot of cases they may be referring to is a design with High Availability. We have a HA set up and I constantly refer to our Primary device as "main".
Also we have several connections to the outside world one of which we route all of our internet traffic out of and the others we don't route anything other than traffic going to specific destinations / VPN connections and so on also you may have multiple circuits in different physical location. This was done for several reason based on physical location of the circuit(i.e. different buildings across our WAN), compliance issues and management requests.
When we talk about our firewall that handles our internet traffic internally or with outside resources we always refer to it as the "Main" firewall.

And most newer firewalls or Next generation firewalls can handle multiple rules for the same destinations/sources so as long as you manage your firewall rules properly rules shouldn't conflict although some admins can create a rule and unintentionally have that rule break something else. In this case though the admin should be able to figure out what part of the new rule has created the conflict and be more specific with the rule to correct the issue.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

If you get continual lockouts after changing your Active Directory password, there are several possible reasons.  Two of the most common are using other devices to access your email and stored passwords in the credential manager of windows.
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video discusses moving either the default database or any database to a new volume.

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now