18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

304 <strong>B2B</strong> <strong>Integration</strong> — A <strong>Practical</strong> <strong>Guide</strong> <strong>to</strong> <strong>Collaborative</strong> E-<strong>commerce</strong><br />

others. These machines have the ability <strong>to</strong> cope with any threats<br />

posed by outside requests.<br />

2. Check the source of the traffic. For some types of incoming traffic,<br />

it may be necessary <strong>to</strong> check the source. For example, users coming<br />

in via TELNET may have <strong>to</strong> provide their username and password<br />

or a personal <strong>to</strong>ken for identification.<br />

3. Regulate not just the incoming traffic, but also the traffic going from<br />

the internal LAN <strong>to</strong> the external Internet. If a network is compromised,<br />

then it may be made <strong>to</strong> send certain data/packets <strong>to</strong> the outside<br />

Internet <strong>to</strong> addresses where it is not supposed <strong>to</strong> go. Checking where<br />

data is going from the inside <strong>to</strong> the outside can halt this kind of<br />

activity.<br />

4. Encrypting or checking data integrity for all the traffic <strong>to</strong> or from a<br />

network. This 'gateway' type of implementation is also called a<br />

virtual private network.<br />

10.7.3. Types of firewalls<br />

Firewalls generally belong <strong>to</strong> two classes: network level and application<br />

level.<br />

Network level firewalls<br />

Network level firewalls intercept every packet that attempts <strong>to</strong> go in or<br />

out of your network (see Figure 10.13).<br />

A network level firewall acts at the IP — machine address level. It<br />

uses screening routers or packet filters. Each network packet contains<br />

External<br />

Network<br />

Di rect Tratt ic<br />

Possible<br />

Network<br />

Laval<br />

Bastion<br />

[Optional)<br />

,=t Ne<br />

/ (Subnet)<br />

Figure 10.13. — Network level firewall schematic

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!