Without hooting our own horn here - one possible solution is cyberwalls (see 
white paper at www.aberdeen.com).
Alternatives involve combination of routers + firewalls + intrusion detection 
devices, which could get complex if you want to apply filtering, logging and 
policy to non IP protocols which exist in most networks.
Network-1 is one vendor providing such products.

*****************************************
Avi A. Fogel, President and CEO
Network-1 Security Solutions, Inc.
"The Intranet Security Company"
70 Walnut St.
Wellesley Hills, MA 02481-2175
Tel:    781-239-8280
Fax:    781-239-8281
Web:    http://www.network-1.com
Ticker: NASDAQ:NSSI
*****************************************

On Tuesday, January 19, 1999 10:24 AM, Sadler, Connie J 
[SMTP:[EMAIL PROTECTED]] wrote:
>
> Does anybody have some documentation on firewall architectures for
> InTRAnets? We currently utilize DMZ architectures, perimeter firewalls,
> authentication through the perimeter, and some internally protected
> enclaves, but what kind of design will accommodate the pressures necessary
> to control access for vendors, suppliers, foreign employees, partners on
> joint ventures (who also compete on other contracts), customers, etc., all
> needing access to information internal to the network?? Even if we move most
> of these machines into a DMZ, access controls within that DMZ are still
> necessary! The architecture is complex, and the migration to a new design
> even more difficult. Anyway, I'm just fishing for some new ideas and any
> constructive comments will be appreciated.
>
> Thanks...
>
> [EMAIL PROTECTED]
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to