1.

What Are The Recommended Practices In Designing Firewalls?

Answer»
  1. All traffic from the trusted network is allowed out
  2. The firewall device is always inaccessible directly from the public network
  3. Allow Simple Mail Transport PROTOCOL (SMTP) data to pass through your firewall, but insure it is all routed to a well-configured SMTP GATEWAY to FILTER and route messaging traffic securel,
  4. All Internet Control Message Protocol (ICMP) data should be denied
  5. Block telnet (terminal emulation) access to all INTERNAL servers from the public networks
  6. When Web SERVICES are offered outside the firewall, deny HTTP traffic from reaching your internal networks by using some form of proxy access or DMZ architecture.



Discussion

No Comment Found