The
perimeter network is another layer of security, an additional network
between the external network and your protected internal network. If
an attacker successfully breaks into the outer reaches of your
firewall, the perimeter net offers an additional layer of protection
between that attacker and your internal systems.
Here's an example of why a perimeter network can be helpful. In
many network setups, it's possible for any machine on a given
network to see the traffic for every machine on that network. This is
true for most Ethernet-based networks (and Ethernet is by far the
most common local area networking technology in use today); it is
also true for several other popular technologies, such as token ring
and FDDI. Snoopers may succeed in picking up passwords by watching
for those used during Telnet, FTP, and rlogin
sessions. Even if passwords aren't compromised, snoopers can
still peek at the contents of sensitive files people may be
accessing, interesting email they may be reading, and so on; the
snooper can essentially "watch over the shoulder" of
anyone using the network. A large number of tools are available that
attackers use to do this sort of snooping and to conceal that
it's being done.
With a perimeter network, if someone breaks into a bastion host on
the perimeter net, they'll be able to snoop only on traffic on
that net. All the traffic on the perimeter net should be either to or
from the bastion host, or to or from the Internet. Because no
strictly internal traffic (that is, traffic between two internal
hosts, which is presumably sensitive or proprietary) passes over the
perimeter net, internal traffic will be safe from prying eyes if the
bastion host is compromised.
Obviously, traffic to and from the bastion host, or the external
world, will still be visible. Part of the work in designing a
firewall is ensuring that this traffic is not itself confidential
enough that reading it will compromise your site as a whole.