Educause Security Discussion mailing list archives
Re: Closed Network Implementation?
From: Mike Iglesias <iglesias () UCI EDU>
Date: Fri, 8 Mar 2013 12:51:45 -0800
On 03/08/2013 11:34 AM, Willis Marti wrote:
One should do it at both border and closer to the target. The border FW provides a basic protection for everyone, and guards against new systems put up without your knowledge or sysadmins that make a mistake. Then you can build on that with localized firewalls arounf high value targets.
That's exactly what we do. -- Mike Iglesias UCI Network Security Team Email: security () uci edu University of California, Irvine phone: 949-824-6926 Office of Information Technology FAX: 949-824-2270
Current thread:
- Re: Closed Network Implementation?, (continued)
- Re: Closed Network Implementation? Willis Marti (Mar 07)
- Re: Closed Network Implementation? Rick Coloccia (Mar 07)
- Re: Closed Network Implementation? Barron Hulver (Mar 07)
- Re: Closed Network Implementation? Leo Song (Mar 08)
- Re: Closed Network Implementation? Rick Coloccia (Mar 08)
- Re: Closed Network Implementation? Harry Hoffman (Mar 08)
- Re: Closed Network Implementation? Rick Coloccia (Mar 08)
- Re: Closed Network Implementation? Rick Coloccia (Mar 07)
- Re: Closed Network Implementation? Willis Marti (Mar 07)
- Re: Closed Network Implementation? Harry Hoffman (Mar 08)
- Re: Closed Network Implementation? Willis Marti (Mar 08)
- Re: Closed Network Implementation? Mike Iglesias (Mar 08)
- Re: Closed Network Implementation? Michael Sinatra (Mar 08)
- Re: Closed Network Implementation? Mike Iglesias (Mar 08)
- Re: Closed Network Implementation? Michael Sinatra (Mar 08)