Phase 1
- Install physical and virtual firewall infrastructure
- Redundant Firewall Design — physical layer
- Create / Update firewall rules
- Example of Border Firewall rules
- Example of BadGuys
- Example of Border Firewall rules
Phase 2
- Install physical and virtual intrusion prevention system
- Create VRFs (virtual routing and forwarding) on core routers
- Create / Update intrusion prevention rules