?
Solved

"main firewall"

Posted on 2012-04-02
1
Medium Priority
?
426 Views
Last Modified: 2012-08-13
I did a little reading on perimeter network security and the same phrase kept coming up, our "main firewall" is XYZ. Does that mean companies will utilise more than one perimeter firewall? If so - why, why would you use more than 1? Is there a danger of the firewall settings conflicting with each other and thus the admin not knowing whats in place? I dont understand why people would need/utilise more than 1 firewall - albeit its not my area of expertese.
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 4

Accepted Solution

by:
schmitty007 earned 2000 total points
ID: 37796913
In a lot of cases they may be referring to is a design with High Availability. We have a HA set up and I constantly refer to our Primary device as "main".
Also we have several connections to the outside world one of which we route all of our internet traffic out of and the others we don't route anything other than traffic going to specific destinations / VPN connections and so on also you may have multiple circuits in different physical location. This was done for several reason based on physical location of the circuit(i.e. different buildings across our WAN), compliance issues and management requests.
When we talk about our firewall that handles our internet traffic internally or with outside resources we always refer to it as the "Main" firewall.

And most newer firewalls or Next generation firewalls can handle multiple rules for the same destinations/sources so as long as you manage your firewall rules properly rules shouldn't conflict although some admins can create a rule and unintentionally have that rule break something else. In this case though the admin should be able to figure out what part of the new rule has created the conflict and be more specific with the rule to correct the issue.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
What's worse than having your data encrypted by ransomware? Getting attacked by a so-called "wiper," which simply destroys the data and offers you no hope of ever seeing it again.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question