Firewall guidelines and policies

Authors

  • Álex Ávila Corporación Universitaria Americana
  • Tatiana Echeverría Jiménez Corporación Universitaria Americana
  • Christian Obando Universidad de Antioquia
  • Carlos Federico Ortiz Zuleta Corporación Universitaria Americana

DOI:

https://doi.org/10.21803/ingecana.2.2.496

Keywords:

firewall, Policies And Guidelines, networks, computer security

Abstract

Information systems must be protected by firewalls, which are designed to control traffic flowing between private and
public networks, allowing and denying requests made by the different networks in order to protect them from threats. There
are different types of firewalls that are used depending on the filtering techniques to be implemented, according to the TCP/
IP protocol stack, they can work at network, transport and application level. A good firewall policy design strengthens
network security by controlling certain types of data traffic.

Downloads

Download data is not yet available.

References

NEXICA. Aplicaciones más seguras y rentables. [En línea]. Disponible en: http://www.nexica.com/es/

firewallaplicaciones

FORTINET. Protecting your network from viruses. [En línea]. Disponible en: http://docs.fortinet.com/cb/

html/index.html#page/FOS_Cookbook/UTM/cb_utm_av_basic_db.html

SOPHOS UTM Home edition. [En línea]. Disponible en: http://www.sophos.com/es-es/products/

freetools/ sophos-utm-home-edition.aspx

Á. Gomez Vieites. Enciclopedia de la seguridad informática. Cap 4 Los aspectos técnicos para implantar

las medidas de seguridad en las redes. RA-MA. 2011.

NSS labs. Next Generation Firewall (NGFW). V5.3. Disponible en: https://www.fortinet.com/lat/products/

next-generation-firewall

R. Bustamante. Seguridad en Redes. Universidad Autónoma de Hidalgo. Disponible en: http://www.

uaeh.edu.mx/docencia/Tesis/icbi/licenciatura/do cumentos/Seguridad%20en%20redes.pdf

K. Scarfone, P. Hoffman. Guidelines on firewall and policy. V1. National Institute of Standard and

TechnologyNIST. 2009.

R. Ziegler. Firewalls Linux Guía Avanzada. Prentice Hall. Disponible en: http://hack.dk/~dvc/doc/

Prentice.Hall.-.Firewalls.Linux.(libro-book-espa%C3%B1ol).%5Bwww.elbuscaelinks.com%5D.pdf

R. Hunt. Internet/Intranet firewall security - policy, architecture and transaction services. 1998.

PALO ALTO NETWORKS. Protección contra botnets con el firewall de nueva generación. The network

security company. Disponible en: http://www.exevi.com/doc/PAN_WP_BotNet_ES.pdf

ELSEVIER. Formal security policy implementations in network firewalls. 2012. Computers & Security.

Disponible en: http://www.deepdyve.com/lp/elsevier/formalsecurity-policy-implementations-innetwork-

firewalls-A6AwrNm6ne

Downloads

Published

2022-06-05

Issue

Section

Artículos de Investigación

How to Cite

[1]
Álex . Ávila, T. . Echeverría Jiménez, C. . Obando, and C. F. . Ortiz Zuleta, “Firewall guidelines and policies”, iname, vol. 2, no. 2, pp. 15–28, Jun. 2022, doi: 10.21803/ingecana.2.2.496.