Firewalls And Infrastructure Security

1188 Words3 Pages

Firewalls and Infrastructure Security

A firewall is a network device, hardware, software, or a combination of the two, whose purpose is to enforce a security policy across its connections. It is comparable to a wall that has a window where the wall serves to keep things out, except those permitted through the window. A security policy acts like the glass in the window; it permits some things to pass, light, while blocking others, air. The heart of a firewall is the security policy that it enforces.

Security policies are a series of rules that define what traffic is permissible and what traffic is to be blocked or denied. These are not universal rules, and there are many different sets of rules for a single company with multiple connections. A web server connected to the Internet may be configured only to allow traffic on port 80 for HTTP, and have all other ports blocked. An e-mail server may have only necessary ports for e-mail open, with others blocked. A key to security policies for firewalls is the same as has been seen for other security policies, the principle of least access. Only allow the necessary access for a function, block or deny all unneeded functionality. How an organization deploys its firewalls determines what is needed for security policies for each firewall.

The security topology will determine what network devices are employed at what points in a network. At a minimum, the corporate connection to the Internet should pass through a firewall. This firewall should block all network traffic except that specifically authorized by the security policy. Blocking communications on a port is simple; just tell the firewall to close the port. The issue comes in deciding what services are needed and by whom, and thu...

... middle of paper ...

...vantage of the overall network design and implement usable subnets with virtual local area networks. Use encryption and encapsulation to secure communications of public segments to enable extranets and cross-Internet company traffic. Use items such as intrusion detection systems and firewalls to keep unauthorized users out and monitor activity. Taken together, these pieces can make a secure network that is efficient, manageable, and effective.

Sources:

http://en.wikipedia.org/wiki/Firewall_(networking)

http://en.wikipedia.org/wiki/Access_control_list

http://en.wikipedia.org/wiki/Computer_security

http://en.wikipedia.org/wiki/Network_Address_Translation

http://www.firewallguide.com/

http://www.vicomsoft.com/knowledge/reference/firewalls1.html

http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/firewalls.html

http://web.mit.edu/Kerberos/firewalls.html

More about Firewalls And Infrastructure Security

Open Document