Firewall Security Practices?

  • Firewall Security Practices?

     Ani updated 1 year, 3 months ago 5 Members · 4Replies
  • Ajuz

    May 5, 2021 at 1:50 pm

    What measures do you take for a good firewall security?

  • Ash

    May 5, 2021 at 2:27 pm

    Instead of the basic firewall that comes inbuilt in the OS, having a 3rd party firewall software will improve your security. One of the most popular free firewall software that can run on a very low specification dedicated build is ‘ipfire’ which is commonly used in Linux is a free firewall that is a small and lightweight platform. Also opting for a commercial firewall subscription that doesn’t need a dedicated built is also good. Internet Security Suite from eSet is a very good option.

    Apart from the software firewall we must invest in appliance firewall this is because all appliance firewall is better than software firewall. Another thing to keep in mind while choosing an appliance firewall is to make sure that the firewall has UTM (Unified Threat Management), if this feature isn’t available then you must look for one having UTM as it protects inbound & outbound traffic from a multitude of threats & attack types.

  • Shahid

    May 5, 2021 at 3:23 pm

    Some of the firewall vendor’s updates their virus definition on a daily basis make sure you choose vendors that updates once a day. Having an appliance firewall that’s up to date will help to secure your network tremendously.

  • Ihsan

    May 5, 2021 at 3:37 pm

    You need to make sure that your firewall is secure. Making sure that your firewall doesn’t perform actions that isn’t secure.

    · Disable simple network management protocol (SNMP)

    · Rename, disable, or delete any default user account and modify all your default passwords

    · Make sure that additional administrator accounts are created based on their responsibilities, particularly if multiple administrators will manage your firewall.

  • Ani

    May 5, 2021 at 6:16 pm

    Creating firewall zones will add a layer to security the more zone you create, the more secure your network will become. To protect you network connected devices, you must identify what these devices are and then plan out your network structure to position networks based on their functionality and sensitivity.