Guidelines in Firewalls and Firewall Policies: Recommendation of The National Institute of Standards and Technology Released On 2009
Guidelines in Firewalls and Firewall Policies: Recommendation of The National Institute of Standards and Technology Released On 2009
Guidelines in Firewalls and Firewall Policies: Recommendation of The National Institute of Standards and Technology Released On 2009
1 Introduction:
Connecting two or more networks together has had numerous of threats for
both of the networks especially if one of these networks is the Internet.
As it an open network that anyone can access and place his files on it
(Software, photos, documents… etc); the Internet form a big buggy for the
organization networks (mean LANs) unless these networks are well protected
against malicious attacks.
3.2 The main six threats that the internet can causes is:
1- Weak or no authentication required.
2- Sniffer programs.
3- Cracker Programs.
4- Port scanner Programs.
5- Insecure software.
Because of all these threats and the vulnerabilities that may be made by the
internet attackers there is the need to somehow of protection mechanism to
stand at the line of defiance against this threats.
1
⁽⁾ Guidelines in Firewalls and firewall policies : recommendation of the national institute of standards and
technology ; released on 2009
3.3 The Advantages of the firewalls:
1- They can stop incoming requests to inherently insecure services.
2- They can control access to other services.
3- They are more cost effective than securing each host on the corporate
network since there is often only one or a few firewall systems to
concentrate on.
4- They are more secure than securing each host.
As like any security system the firewalls are not totally secure, so
unfortunately it is had own disadvantages.
Firewalls are often placed at the perimeter of a network. Such a firewall can be
said to have an external and internal interface, with the external interface being
the one on the outside of the network. These two interfaces are sometimes
referred to as unprotected and protected, respectively. However, saying that
something is or is not protected is often inappropriate because a firewall’s
policies can work in both directions.
The packet’s source IP address—the address of the host from which the
packet originated.
The packet’s destination address—the address of the host the packet is
trying to reach.
The network or transport protocol being used to communicate between
source and destination hosts, such as TCP, UDP, or ICMP
Possibly some characteristics of the transport layer communications
sessions, such as session source and destination ports (e.g., TCP 80 for the
destination port belonging to a web server, TCP 1320 for the source port
belonging to a personal computer accessing the server)
The interface being traversed by the packet, and its direction (inbound or
outbound).
Linux Firewall: