Legal Information |
|
This step assumes that you are migrating from a single layer firewall architecture (see figure "Single layer firewall architecture") to a multiple layer architecture (see figure "Multiple layer firewall architecture").
This step also assumes that you have a network topology of one or more private networks and one or more public networks. The public networks typically connect hosts that respond to internal and external requests for service such as WWW (HTTP), FTP, email (SMTP), and DNS.
These hosts may also respond to internal requests for service such as SNMP, file access, and logging. The public network as described here can serve as your DMZ. The private network typically connects hosts that service your internal users including individual user workstations.
Perform the following steps:
The basis for selection is on a service-by-service basis, for example, the Web server on your public network and the host storing the files that the Web server needs to access on your private network. Cycle through the selection and exercise of all services such as Web, file access, DNS, mail, and logging. See figure "Production Environment".
You cannot do a final test of your routing configuration prior to connecting the firewall system to your operational external interfaces (refer to ô9. Install the firewall system.ö and ô10. Phase the firewall system into operation.ö). As a result, you should run live packets through your internal networks using the new firewall system to the greatest extent possible prior to connecting to the outside world.
To mitigate the risk of unexpected problems in this final test phase, you should initiate the operational connections for a small subset of hosts (such as those used by your system and firewall administrators) prior to connecting large numbers of user workstation or server hosts.
Search Knowledge Base | Feedback |