Page 444 - StudyBook.pdf
P. 444

428    Chapter 7 • Topologies and IDS

                 This is a fairly complex example, but helps illustrate the need for differing
             security topologies on the same network. Under no circumstances should COM+
             servers or SQL 2005 servers be exposed to the Internet directly—they should be
             protected by placing them behind a strong security solution.At the same time, you
             do not want to leave IISes exposed to every hacker and script kiddie out there, so
             they should be placed in a DMZ or behind the first firewall or router.The idea
             here is to layer security so that a breach of one set of servers such as the IIS servers
             does not directly expose COM+ or SQL servers.


                What Is a Firewall?
           Head of the Class…  against external threats, such as hackers, coming from another network,
                According to the Microsoft Computer Dictionary (Fifth Edition), a firewall
                is a security system that is intended to protect an organization’s network

                such as the Internet.
                     Simply put, a firewall is a hardware or software device used to keep
                undesirables electronically out of a network the same way that locked
                doors and secured server racks keep undesirables physically away from a
                network. A firewall filters traffic crossing it (both inbound and out-
                bound) based on rules established by the firewall administrator. In this
                way, it acts as a sort of digital traffic cop, allowing some (or all) of the sys-
                tems on the internal network to communicate with some of the systems
                on the Internet, but only if the communications comply with the defined
                rule set.

                 While differing topologies can be effectively used together, in some instances
             they need to be used completely separately from each other.The next sections
             examine the concept of security zones, how to employ them on a network, how
             they work, and what they can provide in regards to increased security.



              EXAM WARNING

                  Make sure you know the definitions of and the differences between a
                  firewall and a DMZ.














          www.syngress.com
   439   440   441   442   443   444   445   446   447   448   449