Jumat, 11 Juni 2010

Steps to Building a firewall

1. Identify owned network form
Knowing the particular form of networks owned toplogi that is in use
and network protocols, will facilitate in designing a firewall
2. Determining Policy or policies
Policy Determination or Policy is a matter that should be doing, good or
poor in the wake of a firewall that is determined by policy / policy
that apply. Among them:
- Determining what needs to serve. That is, what will be
subject to policy or the policy that we will create
- Defining individuals or groups to be charged
policy or that policy
- Determining which services are needed by each individual or
group using the network
- Based on each service that is in use by individuals or groups
will be determined how best configuration that will
makes it even more safe
- Implementing all the policy or that policy
3. Setting up the software or hardware that will be used
Both the operating system that supports or special software support
firewall such as ipchains, or iptables on Linux, etc.. And hardware configuration
that will support the firewall.
4. Configuration test
Tests on the firewall that has been completed in the wake must be done,
especially to know the results we will get, how can
using the usual tools tools such as nmap to audit.
• Bastion Host is a system / part are considered the strongest in the system
by administrator.atau network security can be at the forefront of the blind
considered the most powerful in keeping the attack, thereby becoming part
important in securing a network, usually a firewall component
or the outer portion of the public system. Bastion host will generally use
The operating system that can handle all the needs (eg, Unix, Linux, NT)

0 komentar:

Posting Komentar