- Branch must have connection to DataCenter
- Firewall and network infrastructure services in DataCenter must provide enough throughput to serve all branches
- The access from outside to the branch must be through DataCenter and subject to the management of DataCenter
- Low cost, easy to manage
- High probability of incidents (WAN lines) - Stored data according to decentralization on branches
- Branches can connect with other branches
- Branch firewall service must provide enough throughput to serve connections
- External access to the branch is not required through DataCenter.
- Flexible, high availability
- High cost, difficult to manage
Consider access from inside out external resources
These access can be from branch network clients to DataCenter / other branch resources or to the Internet. Factors to consider:
- Access scope : allows only internal network clients to reach a limited group of external resources. Clients must be members of a domain and be authenticated on the firewall
- Traffic type : need to know the types of traffic transfer protocols that application programs run in the branch network to use. This supports the configuration of packet filtering / blocking services on the firewall.
- Design access rules (access rules) and network rules : use access rules to identify protocols, source networks, destination networks, access content, etc. to enforce external access. Use network rules to determine the blocking / enabling communication between networks. For example, allow Internet users to access Web Server located in the DMZ area of the branch.
- Performance : If you put resources at the branch, the data access speed and the availability of the service at the branch will be very high. However, a high-speed WAN connection is required to connect to the DataCenter to update, synchronize and back up data. If the branch only has a low speed WAN link, it is possible to use the firewall's caching technique to increase network performance.
Consider external access to internal resources
- Traffic type : need to specify how users from outside access to resources in the branch network. In some cases, the firewall may automatically block / filter packets of some common protocols. In addition to other protocols, it is necessary to monitor and configure the administrator.
- Business function : if the branch has the function of providing resources to external clients, it is necessary to configure the firewall service to manage access to these resources.
User support design
The design of firewall services must also ensure functional requirements for clients. Detail:
- Internet access : if the client needs to access the Internet or Web applications, it is possible to configure a Web proxy for the branch network. After configuring the Web proxy, access requests are sent to the firewall and the firewall sends requests to the destination.
- Accessing application programs : If clients need access to application programs that use Winsock through the firewall, it is necessary to configure the clients appropriately for communication from clients through the firewall to the application. out smoothly.
- User authentication : if the branch has regulations on the classification of users to assign access to resources, the firewall needs to authenticate the user. In addition, this also allows access control to each resource object.
Designed for operation
When designing a firewall service, it is necessary to consider the operation of this service. The following factors must take into account:
- Optimization : the firewall service on launch must be optimized for performance. In order to do this, it is necessary to actively monitor the operation of the service through log files and warnings.
- Support : Need to consider the ability to support services. For example, for branches without a technical team, the firewall service needs to be configured for remote management.
- Change : firewall service when needed may have to change. For example, add a new second firewall to protect servers in the branch network. You may need to change the configuration of the first firewall accordingly.
-------------------------------------------------- -----------------
Nguyen Khanh Tung - tungnk@inet.vn
NIIT- INET Information Technology Training Academy
Number 9 Ho Tung Mau - Mai Dich - Cau Giay - Hanoi