Firewalls are devices or programs that control the flow of network traffic between networks or hosts employing differing security postures. This publication provides an overview of several types of firewall technologies and discusses their security capabilities and their relative advantages and disadvantages in detail. It also makes recommendations for establishing firewall policies and for selecting, configuring, testing, deploying, and managing firewall solutions.
Cited By
- Cruz B, Gómez-Meire S, Ruano-Ordás D, Janicke H, Yevseyeva I, Méndez J and D’Agostino D (2019). A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets, Scientific Programming, 2019, Online publication date: 1-Jan-2019.
- Khedri R, Jones O and Alabbad M Defense in Depth Formulation and Usage in Dynamic Access Control Proceedings of the 6th International Conference on Principles of Security and Trust - Volume 10204, (253-274)
- Jinho Hwang , Ramakrishnan K and Wood T (2015). NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms, IEEE Transactions on Network and Service Management, 12:1, (34-47), Online publication date: 1-Mar-2015.
- Fitzgerald W and Foley S Management of heterogeneous security access control configuration using an ontology engineering approach Proceedings of the 3rd ACM workshop on Assurable and usable security configuration, (27-36)
Recommendations
Firewall policy verification and troubleshooting
Firewalls are important elements of enterprise security and have been the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall mainly depends on the quality of its policy (i.e., configuration). ...
Firewall policy change-impact analysis
Firewalls are the cornerstones of the security infrastructure for most enterprises. They have been widely deployed for protecting private networks. The quality of the protection provided by a firewall directly depends on the quality of its policy (i.e., ...