Security Solutions India

 

Access Control & Security Systems Online Directory


Home
 

Google  

 
Browse the subcategories

Asset Protection

Data and Information Security
Software and Security
 

You are here: Home >>Computer and Information security>>Firewall Protection

Firewall Protection

Firewalls are used to protect an organization's internal network from those on the outside (internet). It limits and regulates the access from the outside to the internal network and also regulates traffic going out. It is used to keep outsiders from gaining information to secrets or from doing damage to internal computer systems. Firewalls are also used to limit the access of individuals on the internal network to services on the internet along with keeping track of what is done through the firewall.

Firewalls filter traffic based on their protocol, sending or receiving port, sending or receiving IP address, or the value of some status bits in the packet. There are several types of firewalls which include packet filtering, circuit level relay, and application proxy.

If your organization does not have a firewall, get one. At least implement a packet filtering firewall on a Linux based computer, if money is the concern.
  • The firewall should filter e-mail, FTP file transfers, and web content traffic for potential harmful or hostile code and viruses.
  • No computer should be directly connected to the internet without going through an IS approved firewall. This means independent modem connections to the internet should be forbidden.

Firewall Policy

  • Set up a "spoofing filter" on your firewall - Don't allow traffic from the internet that indicates a source IP address matching any of your internal network addresses. This keeps attackers from "spoofing" your machines and possibly causing them to crash.
  • Prevent spoofing from your network - Place an outbound filter (for addresses inside your network attempting outside access) on the firewall that only allows traffic from valid internal network addresses to be serviced. This should prevent attacks against other networks from being originated in your network.

Related Topics on Computer and Information security

  1. Software Vulnerability Control
  2. Firewall Protection
  3. Network Intrusion Detection
  4. Network Port Scanning
  5. Network Tools passwords
  6. Types of attacks
  7. Application Level Protection
  8. Systems Protection
  9. Mail and Security
  10. Hostile Software

For more topics and tutorials visit - http://www.comptechdoc.org

Browse Categories

Computer And Information Security
CCTV, Surveillance Systems, Equipment & Components
Access Control Components, Equipment And Systems
Alarms, Burglar, Electronic Systems, Equipment & Components
Fire Protection, Detection & Controls
Intrusion Detection
Perimeter Security, Fences, Ballistic
Security & Specialty Services
Security Design Services
Facilities Systems
Miscellaneous

Find Products for :-

 

Find Solutions for:-
Complete information on security services, guarding services, investigators, detectives and security systems. We also have a online directory guide of the companies providing services the above services in different states of India like Delhi, Mumbai, Gurgaon, Banglore, Noida etc. 

www.securityservicesindia.com

 

A Directory on Insurance as well as Insurance related topics updated to the latest. A total solutions site for your basic to advanced Insurance needs
 

www.insurance4india.com

 

Want a loan? Learn the pros and cons for taking a loan and lots of information for your finance problems.

www.finance4india.com

 

Plan a trip to India! Visit the beautiful, culture rich country having diverse climates, castes, languages and creed. Each visit will add a new experience in your life, select your tour and make a trip to India with us

www.visitindia.org.in

 

 

  © Copyright 2005. securitysolutionsindia. All Rights Reserved.