<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Layered Firewalls Implementation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/layered-firewalls-implementation/m-p/2234248#M347399</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Firewall questions should be posted in the Security Firewall forum. This forum is strictly wireless.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 27 Jun 2013 15:41:18 GMT</pubDate>
    <dc:creator>Scott Fella</dc:creator>
    <dc:date>2013-06-27T15:41:18Z</dc:date>
    <item>
      <title>Layered Firewalls Implementation</title>
      <link>https://community.cisco.com/t5/network-security/layered-firewalls-implementation/m-p/2234247#M347395</link>
      <description>&lt;P&gt;Guyz right now , i have 2 periemter firewalls which im relying on and since im replacing them soon i was thinking of buying more firewalls for the Layered firewall implementation but i really want to understand what is the point of applying 3 layers of firewalls for example , like what i will be trying to achieve for a better security ????&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:03:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/layered-firewalls-implementation/m-p/2234247#M347395</guid>
      <dc:creator>Maro.Cisco</dc:creator>
      <dc:date>2019-03-12T02:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: Layered Firewalls Implementation</title>
      <link>https://community.cisco.com/t5/network-security/layered-firewalls-implementation/m-p/2234248#M347399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Firewall questions should be posted in the Security Firewall forum. This forum is strictly wireless.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Jun 2013 15:41:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/layered-firewalls-implementation/m-p/2234248#M347399</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2013-06-27T15:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: Layered Firewalls Implementation</title>
      <link>https://community.cisco.com/t5/network-security/layered-firewalls-implementation/m-p/2234249#M347402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firewall implementation must be designed and configured to implement&amp;nbsp; security functions as a layered structure. An isolation boundary, using&amp;nbsp; separate partitions and domains, must be used to minimize interactions&amp;nbsp; between layers of the design. The lower layers of the design should not&amp;nbsp; depend upon the upper layers. If one layer experiences an error in&amp;nbsp; functionality or security, this should not impact the function of the&amp;nbsp; remaining layers. This layered design minimizes the risk of leakage or&amp;nbsp; corruption of privileged information.&amp;nbsp;&amp;nbsp; This control is normally a function of the firewall application design&amp;nbsp; and is usually not a configurable setting; however, in some&amp;nbsp; applications, there may be settings that must be configured to optimize&amp;nbsp; function isolation. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jun 2013 04:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/layered-firewalls-implementation/m-p/2234249#M347402</guid>
      <dc:creator>mmangat</dc:creator>
      <dc:date>2013-06-28T04:01:43Z</dc:date>
    </item>
    <item>
      <title>Layered Firewalls Implementation</title>
      <link>https://community.cisco.com/t5/network-security/layered-firewalls-implementation/m-p/2234250#M347404</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok another question correct me if im wrong , by default a firewall will deny all traffic in and so i need to open up ports to let traffic in , but still after doing this, firewall will not allow traffic when its initiated from outside world and that's the use of stateful packet inspection ????&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jun 2013 04:11:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/layered-firewalls-implementation/m-p/2234250#M347404</guid>
      <dc:creator>Maro.Cisco</dc:creator>
      <dc:date>2013-06-28T04:11:17Z</dc:date>
    </item>
    <item>
      <title>Layered Firewalls Implementation</title>
      <link>https://community.cisco.com/t5/network-security/layered-firewalls-implementation/m-p/2234251#M347407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Maro,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall will allow traffic from a high security level (like inside interface which has security level of 100) to low security level interfaces (like outside interface or DMZ interface which has security level which have any value less that 100) by default with out access-list. If you need to allow traffic from low to high then you need to specifically allow it through access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With stateful packet inspection what firewall does is, it maintain a table of all the traffic which goes from inside to outside and the return traffic will be allowed (not need of any specific acl) only if the traffic is initiated from inside and have an entry in firewall stateful table,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Najaf&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Please rate when applicable or helpful !!!&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jun 2013 05:22:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/layered-firewalls-implementation/m-p/2234251#M347407</guid>
      <dc:creator>kcnajaf</dc:creator>
      <dc:date>2013-06-28T05:22:13Z</dc:date>
    </item>
    <item>
      <title>Layered Firewalls Implementation</title>
      <link>https://community.cisco.com/t5/network-security/layered-firewalls-implementation/m-p/2234252#M347410</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Najaf but i need to ask design question , i have servers that will be exposed to the internet access , also i have server farm which will be used to internal use , now what do u think of this design , Internet-----Redundant Firewall1 with IPS------Firewall 2----------Core switch -------------Distributuion switchs-------------End user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall1: outer interface to internet , Internal interface to firewall2 , DMZ interface to DNS and EMail server&lt;/P&gt;&lt;P&gt;Firewall2 : Outer interface to firewall1 , DMZ interface to Server Farm , internal interface for core switchs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i was thinking to place Websense and bluecoat proxy servers to DMZ interface with server farm is this valid ????&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jun 2013 09:35:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/layered-firewalls-implementation/m-p/2234252#M347410</guid>
      <dc:creator>Maro.Cisco</dc:creator>
      <dc:date>2013-06-28T09:35:32Z</dc:date>
    </item>
  </channel>
</rss>

