|  | 20.1 |  | Introduction | 
                                       
                                          |  | 20.1.1 |  | History and Background | 
                                       
                                          |  | 20.1.1.1 |  | Changing Network Models | 
                                       
                                          |  | 20.1.2 |  | Progression of Network Security Mechanisms | 
                                       
                                          |  | 20.1.2.1 |  | Router Access Control Lists | 
                                       
                                          |  | 20.1.2.2 |  | Dedicated Host-based Firewall Applications | 
                                       
                                          |  | 20.1.2.3 |  | Purpose-built Firewall Appliances | 
                                       
                                          |  | 20.1.2.4 |  | Personal Firewalls | 
                                       
                                          |  | 20.2 |  | Role of Network Security Mechanisms | 
                                       
                                          |  | 20.2.1 |  | Perimeter Protection | 
                                       
                                          |  | 20.2.1.1 |  | Control of Allowed Paths | 
                                       
                                          |  | 20.2.1.2 |  | Intrusion Detection | 
                                       
                                          |  | 20.2.2 |  | Additional Roles of the Firewall and Proxy Server | 
                                       
                                          |  | 20.2.2.1 |  | Intrusion Response | 
                                       
                                          |  | 20.2.2.2 |  | Encryption | 
                                       
                                          |  | 20.2.2.3 |  | Content Inspection | 
                                       
                                          |  | 20.2.2.4 |  | Caching | 
                                       
                                          |  | 20.3 |  | Technical Detail: Firewalls | 
                                       
                                          |  | 20.3.1 |  | Security Tasks | 
                                       
                                          |  | 20.3.1.1 |  | Authorization | 
                                       
                                          |  | 20.3.1.2 |  | Availability | 
                                       
                                          |  | 20.3.1.3 |  | Accounting and Audit | 
                                       
                                          |  | 20.3.2 |  | Firewall Architectures | 
                                       
                                          |  | 20.3.2.1 |  | Rule Processing on Routing Devices | 
                                       
                                          |  | 20.3.2.2 |  | Packet-filtering Firewalls | 
                                       
                                          |  | 20.3.2.3 |  | Stateful Inspection Firewalls | 
                                       
                                          |  | 20.3.2.4 |  | Application Gateway Firewalls | 
                                       
                                          |  | 20.3.2.5 |  | Hybrid Firewalls | 
                                       
                                          |  | 20.3.3 |  | Technical Detail: Proxy Servers | 
                                       
                                          |  | 20.4 |  | Available and Emerging Technologies | 
                                       
                                          |  | 20.4.1 |  | Consolidated Management Consoles | 
                                       
                                          |  | 20.4.2 |  | Unified Intrusion Detection | 
                                       
                                          |  | 20.4.3 |  | Unified Alerting and Reporting | 
                                       
                                          |  | 20.4.4 |  | Content Vectoring | 
                                       
                                          |  | 20.4.5 |  | Multifunction Devices | 
                                       
                                          |  | 20.4.6 |  | Automated Allowed-Path Inspection | 
                                       
                                          |  | 20.5 |  | Successful Deployment of Network Security Mechanisms | 
                                       
                                          |  | 20.5.1 |  | Screened Subnet Firewall Architectures | 
                                       
                                          |  | 20.5.2 |  | Management and Monitoring Strategies | 
                                       
                                          |  | 20.5.2.1 |  | Direct Console Method | 
                                       
                                          |  | 20.5.2.2 |  | Out-of-Band Method | 
                                       
                                          |  | 20.5.2.3 |  | Isolated In-Band Management | 
                                       
                                          |  | 20.5.2.4 |  | Full In-Band Managemen | 
                                       
                                          |  | 20.5.3 |  | Firewall and Proxy Server Configuration and Management | 
                                       
                                          |  | 20.5.3.1 |  | Rule Creation | 
                                       
                                          |  | 20.5.3.2 |  | Implicit Rules and Default Configurations | 
                                       
                                          |  | 20.5.4 |  | A Constantly Changing Security Landscape | 
                                       
                                          |  | 20.5.4.1 |  | Full Disclosure Security Forums and Resources | 
                                       
                                          |  | 20.5.4.2 |  | Vendor Security Alerts and Updates | 
                                       
                                          |  | 20.5.4.3 |  | Internal Technical Resources | 
                                       
                                          |  | 20.6 |  | For Further Reading |