You are here: hacking technology > firewall > Content
Hot Articles
Recommend Articles
New Articles
Deploys the firewall strategy 15 rules
  Add date: 07/16/2008   Publishing date: 07/16/2008   Hits: 7
1st, the computer does not have the cerebrum. Therefore, when firewall's behavior and your request are inconsistent, please inspect your disposition, but do not complain the firewall.  

  2nd, only allows you to want the permission the customer, the source address, the destination and the agreement. Careful inspects your each rule, looked that rule element whether to need with you consistency.  

  3rd, the rejection rule must certainly place the permission in front of the rule.  

  4th, when needs to use the rejection, the explicit rejection is the most important consideration way.  

  5th, in does not affect the firewall strategy to carry out in the effect situation, please a match higher rule put before.  

  6th, in does not affect the firewall strategy to carry out in the effect situation, please aim at all users the rule to put before.  

  7th, simplifies your rule as far as possible, carries out a regular efficiency forever to carry out two regular efficiencies to be higher.  

  8th, never must use in the commercial network permits the rule completely, like this is only lets your firewall exist in name only.  

  9th, if may realize through the disposition system strategy, is not unnecessary to establish again from the definition rule.  

  10th, the ISA each access rule is independent, carries out when each access rule will not receive other access rule the influence.  

  11th, forever do not allow any network to visit this aircraft's all agreements. The internal network is also incredible.  

  12th, when you have used the identification authentication, please dispose the customer is the Web proxy customer or the firewall customer.  

  13th, regardless of as access rule's in goal or the source, should better use the IP address.  

  14th, if you must certainly use the domain name collection or the URL collection in the access rule, should better the customer disposition be the Web proxy customer.  

  15th, finally, please remember, the firewall strategy's test is essential.
Prev:About low in high security rank firewall's several principles Next:Recommends 20 outstanding firewalls

Comment:

Category: Home > firewall