Guidelines on Firewalls and Firewall Policy: Revision 1DIANE Publishing, 2010 - 42 páginas This updated report provides an overview of firewall technology, and helps organizations plan for and implement effective firewalls. It explains the technical features of firewalls, the types of firewalls that are available for implementation by organizations, and their security capabilities. Organizations are advised on the placement of firewalls within the network architecture, and on the selection, implementation, testing, and management of firewalls. Other issues covered in detail are the development of firewall policies, and recommendations on the types of network traffic that should be prohibited. The appendices contain helpful supporting material, including a glossary and lists of acronyms and abreviations; and listings of in-print and online resources. Illus. |
Outras edições - Ver todos
Termos e frases comuns
able access control activity acts additional administrators allow application firewall application-proxy gateway architecture attacks authentication block changes checks communications configuration connection create deny deployed deployment destination detection determine device direct document encrypted established example external Figure firewall policy firewall technologies firewall’s fragmented functionality Guide handle hardware hosts ICMP identify implement important inbound incoming inside inspection interfaces internal Internet involves IP addresses IPsec IPv4 IPv6 layer limited lists multiple network firewalls network traffic NIST SP operating organization organization’s outbound packet filtering particular pass perform perimeter permitted personal firewall placed planning port possible prevent protected protocols proxy proxy server recommendations remote requirements risk router routing rules ruleset security policy server single solution specific Standards technologies testing threats transport tunneling types typically usually Virtual