Physical firewall security
Physical access to the firewall must be tightly controlled to preclude any authorized changes to the firewall configuration or operational status and to eliminate any potential for monitoring firewall activity. In addition, precautions should be taken to ensure that proper environment alarms and backup systems are available so the firewall remains online.
Tip The organization firewall should be located in a controlled environment, with access limited to a network services manager, the firewall administrator, and the backup firewall administrator.
Tip The room in which the firewall is to be physically located must be equipped with heat, air conditioner, and smoke alarms to ensure the proper working order of the room. The placement and recharge status of the fire extinguishers should be checked regularly. If uninterruptible power service is available to any Internet-connected systems, such service should be provided to the firewall as well.
In this tutorial:
- Firewall Security Policy
- Firewall protection
- Firewall architectures
- Multi-homed host
- Screened host
- Screened subnet
- Types of firewalls
- Packet-filtering gateways
- Application gateways
- Hybrid or complex gateways
- Routing versus forwarding
- IP spoofing
- DNS and mail resolution
- Intranet
- Network trust relationships
- Virtual private networks
- Qualification of the firewall administrator
- Remote firewall administration
- Firewall backup
- System integrity
- Physical firewall security
- Firewall incident handling
- Upgrading the firewall
- Revision/update of firewall policy
- Examples of service-specific policies