Protecting the perimeter
Perimeter firewalls (or clusters) are used to create the following enforcement points:
- Between internal clients (or hosts) and the core (Figure 2.8)
- Between external clients and publicly accessible resources in data centers (as shown in Figure 2.10):
- Between internal clients (or hosts) and resources on the internet and extranets (as shown in Figure 2.11):
- Between specific segments of data centers and resources on the internet and extranets (as shown in Figure 2.12):
- Between groups of internal clients (or hosts) (as shown in Figure 2.13):
A perimeter is comprised of segments behind firewalls (or clusters...