Solved

"main firewall"

Posted on 2012-04-02
1
411 Views
Last Modified: 2012-08-13
I did a little reading on perimeter network security and the same phrase kept coming up, our "main firewall" is XYZ. Does that mean companies will utilise more than one perimeter firewall? If so - why, why would you use more than 1? Is there a danger of the firewall settings conflicting with each other and thus the admin not knowing whats in place? I dont understand why people would need/utilise more than 1 firewall - albeit its not my area of expertese.
0
Comment
Question by:pma111
1 Comment
 
LVL 4

Accepted Solution

by:
schmitty007 earned 500 total points
ID: 37796913
In a lot of cases they may be referring to is a design with High Availability. We have a HA set up and I constantly refer to our Primary device as "main".
Also we have several connections to the outside world one of which we route all of our internet traffic out of and the others we don't route anything other than traffic going to specific destinations / VPN connections and so on also you may have multiple circuits in different physical location. This was done for several reason based on physical location of the circuit(i.e. different buildings across our WAN), compliance issues and management requests.
When we talk about our firewall that handles our internet traffic internally or with outside resources we always refer to it as the "Main" firewall.

And most newer firewalls or Next generation firewalls can handle multiple rules for the same destinations/sources so as long as you manage your firewall rules properly rules shouldn't conflict although some admins can create a rule and unintentionally have that rule break something else. In this case though the admin should be able to figure out what part of the new rule has created the conflict and be more specific with the rule to correct the issue.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question