Firewall Management
WHAT IS FIREWALL?
Firewall is a network security device that is designed to monitor unauthorized access to or from the private network. It can be hardware or software. Firewalls prevent unauthorized users from accessing private networks connected to the internet. It provides a barrier to control network traffic. The most important use of a Firewall is to protect your computer or the network from being attacked by internet hackers, viruses, and worms.
FIVE TYPES OF FIREWALLS:
- Stateful inspection firewalls evaluate network traffic to determine whether one packet is related to another packet.
- Next-gen firewalls use a multilayered approach to consolidate enterprise firewall capabilities with an IPS and application control.
- Packet filtering firewalls evaluate data packets in isolation and don't know the packet's context.
- Application-level gateways inspect packets at the application layer of the Open Systems Interconnection (OSI) reference model.
- Circuit-level gateways provide security by monitoring TCP handshaking between packets from trusted clients or servers to untrusted hosts and vice versa.
ADVANTAGES OF FIREWALL SECURITY:
- Easy installation procedure
- Companies can easily manage websites that can be accessed by employees. Automatically blocking the user from accessing other websites except for the ones provided by the company.
- It can block suspicious IP addresses.
- Protects network from viruses and worms
- It controls the traffic in and out of the network.
- It blocks other computers from accessing programs installed in your computer or network.
- It protects your wireless network (WiFi)
LIMITATIONS OF FIREWALL SECURITY:
- A firewall cannot stop users from access inaccessible websites when they are using malicious codes.
- It cannot prevent users or attackers when they are using a modem if they are dialing in to or out of the internal network.
- A firewall cannot protect a network that is lacking security systemsor measures.
- It cannot always protect your network from h As hackers don’t just attack malware or trojans – they know where exactly to get into your computer or network thus, bypassing the firewall.
FIREWALL VENDORS:
There are different types of firewalls - features and vendors available to choose from based on what your network needs.
- Cisco Firepower Series is an integrated suite of network security and traffic management products, deployed either on purpose-built platforms or as a software solution.
- Barracuda CloudGen Firewall offers a comprehensive set of next-generation firewall technologies to ensure real-time network protection against a broad range of network threats, vulnerabilities, and exploits, including SQL injections, cross-site scripting, denial of service attacks, trojans, viruses, worms, spyware, and many more.
- Fortinet FortiGate combinesthe functionality of traditional firewalls with deep packet inspection (DPI) and machine learning to bring enhanced protection to your network.
- SonicWall Network Security appliance Series provides organizations that range in scale from mid-sized networks to distributed enterprises and data centers with advanced threat prevention in a high- performance security platform.
- Sophos XG Series provides unprecedented visibility into your network, users, and applications directly from the all-new control center.
STEP BY STEP GUIDE TO FIREWALL CONFIGURATION:
Step 1: Secure your firewall. Update your firewall to the latest firmware.
Step 2: Architect your firewall zones and IP addresses. Plan out your network structure so that these assets can be grouped together and placed into networks (or zones) based on similar sensitivity level and function.
Step 3: Configure access control lists Make your ACLs specific to the exact source and/or destination IP addresses and port numbers whenever possible. At the end of every access control list, make sure there is a “deny all” rule to filter out all unapproved traffic. Apply both inbound and outbound ACLs to each interface and subinterface on your firewall so that only approved traffic is allowed into and out of each zone.
Step 4: Configure your other firewall services and logging. Configure the services you wish to use. Disable all the extra services that you don’t intend to use.
Step 5: Test your firewall configuration. Don’t forget to verify that your firewall is blocking traffic that should be blocked according to your ACL configurations. Testing your firewall should include both vulnerability scanning and penetration testing.
Always remember that network security such as Firewall is there to help us protect our computer network. Businesses should think of security measures that are suitable for the company in order to protect their assets. This is where Jackson Technologies, led by Paul Jackson, CEO/Cybersecurity Specialist comes in. We have various cybersecurity program that suits any business size.