Chapter 2: Common Deployment Scenarios and Network Segmentation
In this chapter, we will learn about the importance of knowing your network architecture and where the firewalls are deployed. We will look at it from the point of view of administrators inheriting an existing architecture, as well as those who are responsible for making suggestions for the new implementations. We will also briefly discuss the sizing methodology for new devices and the performance of your existing firewalls.
In this chapter, we are going to cover the following main topics:
- Understanding your network topology
- Learning about network segmentation
- Protecting the core
- Protecting the perimeter
- Sizing appliances for new implementations – load on current systems
Understanding ...
Get Check Point Firewall Administration R81.10+ now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.