: Define the Initial Internet-to-Data-Center Traffic Security Policy
Focus
Focus

Define the Initial Internet-to-Data-Center Traffic Security Policy

Table of Contents

Define the Initial Internet-to-Data-Center Traffic Security Policy

Define the external application traffic from vendors, customers, partners, etc., that can access your data center from the internet.
As with the other data center traffic flows, tightly control traffic flowing from the internet to the data center with application allow security policy rules so that no traffic using unknown or unsanctioned applications can enter the data center. In addition, protect the data center web servers from denial-of-service (DoS) attacks by applying DoS Protection policy rules (with DoS Protection profiles) to external traffic destined for the data center web server tier.
Risks to the data center from internet traffic include downloading malware from an infected external server, downloading "call home" command-and-control software that enables an attacker to access and control data center assets, and inadvertently allowing access to the data center from the internet. To reduce the attack surface, allow only applications, users, and services that you require for business purposes in the data center. Decrypt, inspect, and log all the traffic that local regulations, laws, and your business requirements allow. In addition, follow DoS and Zone Protection best practices to prevent attackers from disrupting the data center (especially web servers) with DoS attacks.
The following sections show you the type of traffic to allow and how to control it, how to decrypt the traffic, and how to protect your data center assets from DoS attacks: