Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Best practises for security policies.

Posted on 2011-02-12
7
Medium Priority
?
835 Views
Last Modified: 2012-06-27
Hi
i am looking for examples or samples for a security polices that can be applied on any firewall and IPS.
is there any helpful site or documents.


cheers.
0
Comment
Question by:besmile4ever
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 5

Assisted Solution

by:rysic
rysic earned 300 total points
ID: 34878477
0
 

Author Comment

by:besmile4ever
ID: 34881399
Hi
dear what about the IPS?
as I can see it is totaly about the firewall...

Cheers.
0
 
LVL 18

Accepted Solution

by:
liddler earned 900 total points
ID: 34895634
Here are a few:
:
1) Know exactly what you will allow through and what traffic your system(s) produce
2) understand if you can white- or black-list ISPs, countries, traffic types
3) Aim for as few rules as possible, have business owners for each rule
4) Review rules regularly
5) review all logs to tweak rules to remove chatter / false positives
6) Understand any rate limiting capabilities and understand how to adjust them in the event of future traffic growth or how to decrease them in the event of an attack
7) Keep device patched up-to-date
0
Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

 
LVL 19

Expert Comment

by:CoccoBill
ID: 34895822
Get the CIS Cisco Firewall benchmark from the Center for Internet Security: http://cisecurity.org/en-us/?route=downloads.benchmarks. the latest version is 2.2.0 and it is a free download. It includes best practices for firewall management and configuration, use it as the basis for creating the policy.
0
 
LVL 65

Assisted Solution

by:btan
btan earned 300 total points
ID: 34931685
Can check out the answer in this and I have included some tools in my reply in it as well
@ http://www.experts-exchange.com/Networking/Security/Q_26562192.html
0
 

Author Closing Comment

by:besmile4ever
ID: 34932459
thnks.
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

IF you are either unfamiliar with rootkits, or want to know more about them, read on ....
It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question