Configuring Your Hardware Firewall Presented by: Chad Brown Amber Williams
Configuring Your Hardware Firewall
Presented by:Chad Brown
Amber Williams
866-528-9313 | AventisSystems.com
Hardware Firewalls
866-528-9313 | AventisSystems.com
Potential Intrusions
Can Take Many Forms:Attackers who steal dataAttackers who host pirated software on your hardware
Proper Implementation of Firewalls:Ward off threatsKeep data safe
866-528-9313 | AventisSystems.com
Inbound Traffic Control
Only Ports Open = Required for CommunicationExamples:
Port 80 for Internet Access (HTTP)Port 443 for Secure Internet Access (HTTPS)Port 25 for Emails (SMTP)
866-528-9313 | AventisSystems.com
Open Ports for Applications
Additional Open Ports for ApplicationsMost enterprise software open ports during installation
866-528-9313 | AventisSystems.com
Outbound Traffic Control
Prevent Sending of Certain Files or Data Outside NetworkPrevent Users from Accessing Certain Sites
Examples:Social NetworkseCommerce Sites
866-528-9313 | AventisSystems.com
Ensure Internal Transmission
Utilize a Demilitarized Zone (DMZ)Sensitive data can be shared internally
PrivateResource
s
PrivateResource
sInternet
Internal Firewall
Server-side Firewall
Demilitarized Zone (DMZ)
866-528-9313 | AventisSystems.com
DMZ Tips
DMZ Setup TipsUse Multiple Appliances & Configurations
Each employee has own rights within DMZName each device with individual IP address
Do not use actual name or URLIntruders not pointed to device with sensitive data
866-528-9313 | AventisSystems.com
Take a Look
Advanced IT Services - Network & Security Solutionshttp://www.aventissystems.com/Network-and-Security-Solutions-s/8262.htm
Hover & Click
866-528-9313 | AventisSystems.com
Follow Us
@AventisSystems