What Are The Recommended Practices In Designing Firewalls?
Answer»
All traffic from the trusted network is allowed out
The firewall device is always inaccessible directly from the public network
Allow Simple Mail Transport PROTOCOL (SMTP) data to pass through your firewall, but insure it is all routed to a well-configured SMTP GATEWAY to FILTER and route messaging traffic securel,
All Internet Control Message Protocol (ICMP) data should be denied
Block telnet (terminal emulation) access to all INTERNAL servers from the public networks
When Web SERVICES are offered outside the firewall, deny HTTP traffic from reaching your internal networks by using some form of proxy access or DMZ architecture.