A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorised access while permitting legitimate communications to pass.
Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet.
Many routers that pass data between networks contain firewall components and conversely, many firewalls can perform basic routing functions.
There are different types of firewalls depending on where the communication is taking place, where the communication is intercepted and the state that is being traced such as:
Network layer firewall – also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set.
Application-layer firewall – This works on the application level of the TCP/IP stack and may intercept all packets traveling to or from an application.
As vendor-independent consultants, Cyber Crime Awareness Society can recommend genuinely bespoke solutions and provide impartial advice on all aspects of firewall application including:
Security Policy Development
The firewall policy establishes which applications, services, systems and users are to be allowed or denied access through the firewall; it also defines user authentication methods. We will advise on the most effective parameters to protect systems within the internal networks and/or on DMZ networks.
Installation, Configuration, Testing and Documentation
Once the security policy is decided, we can install the firewall and configure systems to enforce it. The configuration will be clearly documented and finally tested to ensure that network communications operate both freely and in compliance with policy.
We provide hands-on training so that your own Administrators can cope efficiently with day to day management of the firewall. Topics include: System Architecture; Policy Development; Configuration Files, Log Analysis and Maintenance Routines.
Maintenance and Management Services