White Paper
© Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not constitute a commitment from Decipher Information Systems of any features or functions discussed and is subject to change without notice. Decipher Information Systems assumes no responsibility or liability for any errors or inaccuracies that may appear in this publication. Last revised: June 2006
©Copyright 2005 Decipher Information Systems All Rights Reserved
Table of Contents
Table of Contents................................................................................................................ 3 Firewalls – Overview and Best Practices............................................................................ 4 Abstract ............................................................................................................................... 4 Hardware vs. Software Firewalls........................................................................................ 4 Implementation – Things to Consider................................................................................. 7 Configuring Access Rules................................................................................................... 9 Firewall Logs and Auditing .............................................................................................. 10 Summary ........................................................................................................................... 12
©Copyright 2005 Decipher Information Systems All Rights Reserved
Firewalls – Overview and Best Practices
Abstract
The importance of securing an organization’s internal network has always been high. In today’s world of technology hackers, viruses, mal-ware, and identity theft, companies both large and small have found that properly securing their networks is a