This is a discussion on Re: [fw-wiz] How should an Internet connection/firewall be designed? - Firewalls ; > How many companies have two serial firewalls from different vendors? > > How many companies have an IPS/deep-packet-inspection device between the > firewall and the border router? > > How many companies still use IDS? > > How many ...
> How many companies have two serial firewalls from different vendors?
> How many companies have an IPS/deep-packet-inspection device between the
> firewall and the border router?
> How many companies still use IDS?
> How many companies have some form of deep packet inspection device in
> front of their DMZ web servers? What do they use?
My guess to all four questions above would be "Few small companies, some
medium sized companies, many large companies and very many government
> It seems like the added complexity and multiple devices will increase
> management costs and may actually decrease security and reliability.
> Our current design may be rather simple but in over 12 years we have had
> less than a couple of hours of down time and have not had a detected
> breakin to our internal network.
In general, I believe all added complexity increases management costs
and, if poorly managed, may decrease security and reliability. The
question is what is your budget, what's the trade-offs between security
and availability, and what is the data worth to you compared to the above?
Incidentally, not having a detected break-in to the internal network is
not a great yardstick for how good your security is. For instance, a
small company with no analysts might have a dozen attackers rootkitting
them and not know it.
> I would appreciate any comments.
> Thank you,
> Dave Kaas
> firewall-wizards mailing list
firewall-wizards mailing list