Section 7.8 Firewall Policy

   


7.8 Firewall Policy

There should be a written policy stating what services will be allowed in from the Internet and which systems these services should be allowed to. A good starting point is that nothing beyond SSH and possibly SMTP should be allowed in. Even these should only be allowed to systems whose users have specifically requested them, and after verification that these systems seem reasonably secure and up-to-date.


       
    Top


    Real World Linux Security Prentice Hall Ptr Open Source Technology Series
    Real World Linux Security Prentice Hall Ptr Open Source Technology Series
    ISBN: N/A
    EAN: N/A
    Year: 2002
    Pages: 260

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net