I'm told over and over again by internal staff that "if we are placing firewalls around an internet web zone, why do we need an application layer (or business logic layer) firewalled from the internal network. Why can't we run all the application logic on the core?"
I've explained a defense in depth and protecting the core in the event that a web zone network gets compromised, but that isn't flying. I need either a really good explanation on why I'd need an app zone set of firewalls AND/OR some links showing how this is the best architecture.
I’m with you on this one. The Web Zone or the DMZ zone should always be well protected. After all, this is the only zone that's accessible by and open to the Internet cloud, in most organizations.
Personally, if you were to ask me, there should be at least 3 layers of network defense in most big organizations. Typically, you'll have a DMZ zone i.e. Web Server, Mid Zone i.e. Application Servers / Middleware Servers and End Zone i.e. Database Servers.
Firewalls with Layer 7 inspection aren’t good enough to be placed protecting the DMZ Zone. You'll need to supplement this with network IPS e.g. Cisco ASA 5500 Series IPS Solution. Furthermore, on the Application Servers and Database Servers, you’ll need host based IPS e.g. Cisco Security Agents. These are just my opnion.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...