Firewall guidelines and policies
DOI:
https://doi.org/10.21803/ingecana.2.2.496Keywords:
firewall, Policies And Guidelines, networks, computer securityAbstract
Information systems must be protected by firewalls, which are designed to control traffic flowing between private and
public networks, allowing and denying requests made by the different networks in order to protect them from threats. There
are different types of firewalls that are used depending on the filtering techniques to be implemented, according to the TCP/
IP protocol stack, they can work at network, transport and application level. A good firewall policy design strengthens
network security by controlling certain types of data traffic.
Downloads
References
NEXICA. Aplicaciones más seguras y rentables. [En línea]. Disponible en: http://www.nexica.com/es/
firewallaplicaciones
FORTINET. Protecting your network from viruses. [En línea]. Disponible en: http://docs.fortinet.com/cb/
html/index.html#page/FOS_Cookbook/UTM/cb_utm_av_basic_db.html
SOPHOS UTM Home edition. [En línea]. Disponible en: http://www.sophos.com/es-es/products/
freetools/ sophos-utm-home-edition.aspx
Á. Gomez Vieites. Enciclopedia de la seguridad informática. Cap 4 Los aspectos técnicos para implantar
las medidas de seguridad en las redes. RA-MA. 2011.
NSS labs. Next Generation Firewall (NGFW). V5.3. Disponible en: https://www.fortinet.com/lat/products/
next-generation-firewall
R. Bustamante. Seguridad en Redes. Universidad Autónoma de Hidalgo. Disponible en: http://www.
uaeh.edu.mx/docencia/Tesis/icbi/licenciatura/do cumentos/Seguridad%20en%20redes.pdf
K. Scarfone, P. Hoffman. Guidelines on firewall and policy. V1. National Institute of Standard and
TechnologyNIST. 2009.
R. Ziegler. Firewalls Linux Guía Avanzada. Prentice Hall. Disponible en: http://hack.dk/~dvc/doc/
Prentice.Hall.-.Firewalls.Linux.(libro-book-espa%C3%B1ol).%5Bwww.elbuscaelinks.com%5D.pdf
R. Hunt. Internet/Intranet firewall security - policy, architecture and transaction services. 1998.
PALO ALTO NETWORKS. Protección contra botnets con el firewall de nueva generación. The network
security company. Disponible en: http://www.exevi.com/doc/PAN_WP_BotNet_ES.pdf
ELSEVIER. Formal security policy implementations in network firewalls. 2012. Computers & Security.
Disponible en: http://www.deepdyve.com/lp/elsevier/formalsecurity-policy-implementations-innetwork-
firewalls-A6AwrNm6ne
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Ingente Americana

This work is licensed under a Creative Commons Attribution 4.0 International License.