In this chapter, we will build an external architecture that we will use as we progress through the different phases of attack. We will discuss the following topics in this chapter:
Establishing layered architectures
Configuring firewall architectures
Deploying IDS/IPS and load balancers
Integrating web application firewalls
This chapter will provide us with an external attack architecture that will provide the capability to emulate a number of different testing environments. In the chapter, we will work through the process of configuring the range core devices that are the connecting devices for the architectures such as the router, switches, and the firewall machine. Consequently, we can easily build a target machine or device and plug it into our architecture and begin testing it immediately.