Solved

"main firewall"

Posted on 2012-04-02
1
418 Views
Last Modified: 2012-08-13
I did a little reading on perimeter network security and the same phrase kept coming up, our "main firewall" is XYZ. Does that mean companies will utilise more than one perimeter firewall? If so - why, why would you use more than 1? Is there a danger of the firewall settings conflicting with each other and thus the admin not knowing whats in place? I dont understand why people would need/utilise more than 1 firewall - albeit its not my area of expertese.
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 4

Accepted Solution

by:
schmitty007 earned 500 total points
ID: 37796913
In a lot of cases they may be referring to is a design with High Availability. We have a HA set up and I constantly refer to our Primary device as "main".
Also we have several connections to the outside world one of which we route all of our internet traffic out of and the others we don't route anything other than traffic going to specific destinations / VPN connections and so on also you may have multiple circuits in different physical location. This was done for several reason based on physical location of the circuit(i.e. different buildings across our WAN), compliance issues and management requests.
When we talk about our firewall that handles our internet traffic internally or with outside resources we always refer to it as the "Main" firewall.

And most newer firewalls or Next generation firewalls can handle multiple rules for the same destinations/sources so as long as you manage your firewall rules properly rules shouldn't conflict although some admins can create a rule and unintentionally have that rule break something else. In this case though the admin should be able to figure out what part of the new rule has created the conflict and be more specific with the rule to correct the issue.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question