18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Firewall<br />

Function<br />

Moni<strong>to</strong>r,<br />

Report<br />

Writer<br />

OSKernel TCP/IP<br />

Private<br />

Network<br />

Web Browsers<br />

'Router<br />

aproxy http web gate<br />

i<br />

Internet Security 307<br />

Mail Server<br />

Figure 10.15. — Enigma firewall solution<br />

Web Servers<br />

DMZ<br />

aka<br />

Server Network<br />

an enterprise security policy, is extremely rapid, as most of its components<br />

are pre-installed and pre-configured. These appliances are built<br />

using the latest security technologies; and provide remote administration,<br />

the ability <strong>to</strong> manage multiple firewalls from one location, centralized<br />

built-in reporting and logging for moni<strong>to</strong>ring all activities and the<br />

flexibility and scalability <strong>to</strong> support enterprise level traffic.<br />

Check Point's Firewall-1, Symantec's VelociRap<strong>to</strong>r, Watchguard's<br />

Firebox II and Enigma 2.0 Firewall Appliance are some examples of<br />

enterprise firewall appliances.<br />

Figure 10.15 is a simplified reconstruction of the internal workings<br />

of the Enigma Firewall Appliance. All computers in the private network<br />

and the DMZ communicate with the proxies. The proxies manage<br />

connectivity between the networks and all transfers must pass through<br />

them. There are multiple independent proxies that are tailored <strong>to</strong> provide<br />

application specific defenses, such as e-mail, FTP, HTTP and reverse-<br />

HTTP.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!