Firewalls
Home Up

 

Question:
Name three features you might want to look for when purchasing a firewall
for a corporation.

Answer:
After the decision is made to use a firewall, you need to decide on the
specific features needed. The following is a list from the National
Institute of Standards and technology
(http://csrc.ncsl.nist.gov/nistpubs/800-10) and can be used as general
guidelines:

The firewall should be able to support a ``deny all services except
those specifically permitted'' design policy, even if that is not the
policy used.
The firewall should support your security policy, not impose one.
The firewall should be flexible; it should be able to accommodate new
services and needs if the security policy of the organization changes.
The firewall should contain advanced authentication measures or should
contain the hooks for installing advanced authentication measures.
The firewall should employ filtering techniques to permit or deny
services to specified host systems as needed.
The IP filtering language should be flexible, user-friendly to program,
and should filter on as many attributes as possible, including source and
destination IP address, protocol type, source and destination TCP/UDP port,
and inbound and outbound interface.
The firewall should use proxy services for services such as FTP and
TELNET, so that advanced authentication measures can be employed and
centralized at the firewall. If services such as NNTP, X, http, or gopher
are required, the firewall should contain the corresponding proxy services.
The firewall should contain the ability to centralize SMTP access, to
reduce direct SMTP connections between site and remote systems. This
results in centralized handling of site e-mail.
The firewall should accomodate public access to the site, such that
public information servers can be protected by the firewall but can be
segregated from site systems that do not require the public access.
The firewall should contain the ability to concentrate and filter
dial-in access.
The firewall should contain mechanisms for logging traffic and
suspicious activity, and should contain mechanisms for log reduction so
that logs are readable and understandable.
If the firewall requires an operating system such as UNIX, a secured
version of the operating system should be part of the firewall, with other
security tools as necessary to ensure firewall host integrity. The
operating system should have all patches installed.
The firewall should be developed in a manner that its strength and
correctness is verifiable. It should be simple in design so that it can be
understood and maintained.
The firewall and any corresponding operating system should be updated
with patches and other bug fixes in a timely manner.

 

Dominick Diorio

Home    Digital Certificates    Firewalls    Cryptography    SSL    JAVA