Virtual private networks
Virtual private networks (VPNs) allow a trusted network to communicate with another trusted network over untrusted networks such as the Internet. Because some firewalls provide VPN capability, it is necessary to define policy for establishing VPNs. Firewall-based VPNs can be established in a number of configurations.
Tip: Any connection between firewalls over public networks should use encrypted VPNs to ensure the privacy and integrity of the data passing over the public network. All VPN connections should be approved and managed by a network services manager. Appropriate means for distributing and maintaining encryption keys must be established before operational use of VPNs.
Firewall administration
A firewall, like any other network device, has to be managed by someone. Security policy should state who is responsible for managing the firewall.
Tip Two firewall administrators (one primary and secondary) should be designated by a chief information security officer (or other manager) and should be responsible for the upkeep of the firewall. The primary administrator should make changes to the firewall, and the secondary administrator should only do so in the absence of the former so there is no simultaneous or contradictory access to the firewall.
Tip Each firewall administrator should provide his or her home phone number, pager number, cellular phone number, and other numbers or modes by which they can be contacted when support is required.
In this tutorial:
- Firewall Security Policy
- Firewall protection
- Firewall architectures
- Multi-homed host
- Screened host
- Screened subnet
- Types of firewalls
- Packet-filtering gateways
- Application gateways
- Hybrid or complex gateways
- Routing versus forwarding
- IP spoofing
- DNS and mail resolution
- Intranet
- Network trust relationships
- Virtual private networks
- Qualification of the firewall administrator
- Remote firewall administration
- Firewall backup
- System integrity
- Physical firewall security
- Firewall incident handling
- Upgrading the firewall
- Revision/update of firewall policy
- Examples of service-specific policies