20.01.2014 Views

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Firewall Design<br />

apply basics of security:<br />

• least privilege:<br />

• don’t make hosts do more than they have to (implies: specialize servers)<br />

• use minimum privileges <strong>for</strong> the task in hand<br />

• fail safe<br />

• even if things break it should not leave anything open<br />

• defence in depth<br />

• use several discrete barriers - don’t depend on a single firewall <strong>for</strong> all security<br />

• weakest links<br />

• know the limitations of your defences - understand your weakest link<br />

Firewalls should have sufficient per<strong>for</strong>mance to keep the pipes full - i.e., a firewall<br />

should not limit the amount of traffic flowing across the connection to the external<br />

network, only what flows across it!<br />

Maguire Firewall Design 12: 14 of 30<br />

maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!