Book now with code EOY2025
E Double U said: In a large enough organization with the resources to have both internal and external facing firewalls that is an ideal setup, but that is not feasible in all companies. I once worked in a small-to-medium sized environment that had a HA pair (active/standby) at the main site and a standalone fw at the DR site to protect the perimeter. All traffic traversed that fw via the respective interfaces (inside/outside/DMZ). We were lucky to get a web gateway put in place in our DMZ lol.
manulinx said: E Double U said: In a large enough organization with the resources to have both internal and external facing firewalls that is an ideal setup, but that is not feasible in all companies. I once worked in a small-to-medium sized environment that had a HA pair (active/standby) at the main site and a standalone fw at the DR site to protect the perimeter. All traffic traversed that fw via the respective interfaces (inside/outside/DMZ). We were lucky to get a web gateway put in place in our DMZ lol. yeah, it's pretty easy with one fw connected to DMZ, Internet, and internal.with two fw, if i get to do some filterings (of a traffic coming from internal) at the external fw, the fact is that that traffic goes throughout the first fw without being processed, what looks like a waist of bandwidth of that first firewall.
Edificer said: It's follows a good design of defense in-depth practices. Depending on where you work and how confidential the data is, multi-vendor firewalls can be desired. I had similar implementation where I added an additional firewall in the internal network and put it in bridge mode. So, traffic traversing it would be monitored only. The existence and presence of the firewall was virtually undetectable. So, if someone was up to something they wouldn't know that they're being detected.
JDMurray said: Two firewalls in series can be a more inexpensive solution than a firewall cluster with high-availability fail-over capability. Firewalls can also do things other than packet filtering, such as NATting.
UnixGuy said: Edificer said: It's follows a good design of defense in-depth practices. Depending on where you work and how confidential the data is, multi-vendor firewalls can be desired. I had similar implementation where I added an additional firewall in the internal network and put it in bridge mode. So, traffic traversing it would be monitored only. The existence and presence of the firewall was virtually undetectable. So, if someone was up to something they wouldn't know that they're being detected. What can the second (monitoring only) firewall detect that the first firewall couldn't? Why not put an IDS instead? I'm not sure this is a cost effective way of doing itYou mention defense in-depth, I had this exact same conversation before. Defense in depth is having multiple layers of different controls, not the same controls one infront of the other. if an attacker can traverse one firewall, they will traverse the next one, same technology, IP/Port filtering is IP/port filtering
kaiju said: The external FW will normally rely on the typical port-based policies while the internal FW will do deeper packet inspection. The internal/external combo setup is most commonly used by large enterprise networks. Small to medium organizations can get by with a single stateful inspection or next-generation firewall.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!