A Basic Firewall Configuration Strategy for the Protection of Development-related Computer Networks and Subnetworks

  • Authors:
  • Sujan Maskey;Brittany Jansen;Dennis Guster;Charles Hall

  • Affiliations:
  • Business Computing Research Laboratory, St. Cloud State University, St. Cloud, MN, USA;Business Computing Research Laboratory, St. Cloud State University, St. Cloud, MN, USA;Business Computing Research Laboratory, St. Cloud State University, St. Cloud, MN, USA;Business Computing Research Laboratory, St. Cloud State University, St. Cloud, MN, USA

  • Venue:
  • Information Systems Security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

As more and more development-related networks, both instructional and industry related, are being attached to the Internet, the need for protection from hackers becomes evident. This is largely due to the fact that security breaches have reached epidemic proportions. The article therein examines these issues as well as presents a case study for a basic firewall configuration. The logic behind the case study is based on four different modules containing one or more sections: environmental, forward rules, allow ping, and post-routing rules. A figure and source code is provided to indicate how the logic would appear once the plan had been implemented. The example was designed as such in hopes that a more sophisticated and usable product could emerge. In addition, this template could be considered a useful learning and/or teaching resource when teaching basic firewall configurations.