Excellent video! Helpful to this networking greenhorn who's attempting to design an upgrade to my home network. Thanks very much.
@johnson5546716 жыл бұрын
Man, I'd give you three thumbs up if I could! You explained things so well. Will check out your other vids!
@AxionSmurf5 жыл бұрын
I don't think he wants your third thumb
@davhernandez172 жыл бұрын
Thank you! that was amazingly clear
@arshidrashid5988 жыл бұрын
great job professor thumbs up. explained in a really simple way. thanks for sharing
@aballesteros54255 жыл бұрын
Hi @AlgoSec , at around 4:47 , the connection from the DATA-FW , APP-FW , WEB-FW to the MAIN-FW, are they on the same Network or same broadcast doamin ( eg. are all the Interface peering IPs are on the same /24) OR Do they have their own separate network?
@zomgoose5 жыл бұрын
Great explanation! Thank you!
@esthermdzitiro314 жыл бұрын
Great explanation, thank you.
@vpcnetwork31814 жыл бұрын
Is it possible to do Zones in one firewall rather then virtual firewall contents ?
@AxionSmurf5 жыл бұрын
Great video!
@leo-rq2ei7 жыл бұрын
great video thanks!
@mingxindong31507 жыл бұрын
Can we just have a switch between the firewall and servers, so we can have Vlan and separate the traffic.
@jeffcojd7 жыл бұрын
If it's a layer 2 switch you can only have one VLAN through it, it's all on the same broadcast domain.
@tempone10156 жыл бұрын
You can use roas "router-on-a-stick" approach if u want to use an L2 switch for the servers, so u can have separate vlans in each server.
@aaltameemi3 жыл бұрын
Yes, you can and this is the best option rather than creating virtual Firewall for each zone. Therefore, simply assign each App, Data, Web systems (phsyical or virtualized servers) into a switch and segreate between them using VLANs. Connect the firewall to the switch as a Trunk and create sub-interfaces, where each sub-interface tagged with a VLAN for each zone. Then in firewall assign each sub-interface into different security zone (Web, App, Data) and start configuring firewall rules between zones.
@NuraSheikh1Ай бұрын
Awesome
@makistsiros27835 жыл бұрын
And we are back to a single hw firewall box as a single point of failure no?
@AlgoSec5 жыл бұрын
Thank you for you question a) It's possible to use a virtual firewall if your organization prefers to avoid appliances: all major vendors have virtualized their products to work in both private-cloud or public-cloud environments. Also most vendors allow in-product virtualization (having multiple virtual firewalls inside one big hardware chassis). b) All firewall vendors offer clustered high-availability solutions to avoid a single-point-of-failure situations (so do router vendors) c) SDN and cloud platform providers (VMware, Cisco ACI, AWS, Azure, etc) all provide filtering capabilities within their fabric, which is another path to take So you have plenty of options - and in all them the considerations I discussed in the video are relevant . I hope this answers your question.
@certifiedprogrammer45987 жыл бұрын
Thanks professor you explained clear in it
@rilcoeng8 жыл бұрын
Now the audio it's very nice
@ultimatums12 жыл бұрын
This was nothing about best practices. more like different design examples.