Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

"main firewall"

Posted on 2012-04-02
1
Medium Priority
?
433 Views
Last Modified: 2012-08-13
I did a little reading on perimeter network security and the same phrase kept coming up, our "main firewall" is XYZ. Does that mean companies will utilise more than one perimeter firewall? If so - why, why would you use more than 1? Is there a danger of the firewall settings conflicting with each other and thus the admin not knowing whats in place? I dont understand why people would need/utilise more than 1 firewall - albeit its not my area of expertese.
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 4

Accepted Solution

by:
schmitty007 earned 2000 total points
ID: 37796913
In a lot of cases they may be referring to is a design with High Availability. We have a HA set up and I constantly refer to our Primary device as "main".
Also we have several connections to the outside world one of which we route all of our internet traffic out of and the others we don't route anything other than traffic going to specific destinations / VPN connections and so on also you may have multiple circuits in different physical location. This was done for several reason based on physical location of the circuit(i.e. different buildings across our WAN), compliance issues and management requests.
When we talk about our firewall that handles our internet traffic internally or with outside resources we always refer to it as the "Main" firewall.

And most newer firewalls or Next generation firewalls can handle multiple rules for the same destinations/sources so as long as you manage your firewall rules properly rules shouldn't conflict although some admins can create a rule and unintentionally have that rule break something else. In this case though the admin should be able to figure out what part of the new rule has created the conflict and be more specific with the rule to correct the issue.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're a modern-day technology professional, you may be wondering if certifications are really necessary. They are. Here's why.
An overview of cyber security, cyber crime, and personal protection against hackers. Includes a brief summary of the Equifax breach and why everyone should be aware of it. Other subjects include: how cyber security has failed to advance with technol…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question