What is Firewall Configuration and Why is it Important? | Fortinet (2024)

How To Configure a Firewall

Proper configuration is essential to supporting internal networks andstateful packet inspection. Here is how to configure a firewall securely:

1. Secure the firewall

Securing a firewall is the vital first step to ensure only authorized administrators have access to it. This includes actions such as:

  1. Update with the latest firmware
  2. Never putting firewalls into production without appropriate configurations in place
  3. Deleting, disabling, or renaming default accounts and changing default passwords
  4. Use unique, secure passwords
  5. Never using shared user accounts. If a firewall will be managed by multiple administrators, additional admin accounts must have limited privileges based on individual responsibilities
  6. Disabling the Simple Network Management Protocol (SNMP), which collects and organizes information about devices on IP networks, or configuring it for secure usage
  7. Restricting outgoing and incoming network traffic for specific applications or the Transmission Control Protocol (TCP)

2. Establish firewall zones and an IP address structure

It is important to identify network assets and resources that must be protected. This includes creating a structure that groups corporate assets into zones based on similar functions and the level of risk.

A good example of this is servers—such as email servers, virtual private network (VPN) servers, and web servers—placed in a dedicated zone that limits inbound internet traffic, often referred to as ademilitarized zone (DMZ). A general rule is that the more zones created, the more secure the network is.

However, having more zones also demands more time to manage them. With a network zone structure established, it is also important to establish a corresponding IP address structure that assigns zones to firewall interfaces and subinterfaces.

3. Configure access control lists (ACLs)

Access control lists (ACLs) enable organizations to determine which traffic is allowed to flow in and out of each zone. ACLs act as firewall rules, which organizations can apply to each firewall interface and subinterface.

ACLs must be made specific to the exact source and destination port numbers and IP addresses. Each ACL should have a “deny all” rule created at the end of it, which enables organizations to filter out unapproved traffic. Each interface and subinterface also needs an inbound and outbound ACL to ensure only approved traffic can reach each zone. It is also advisable to disable firewall administration interfaces from public access to protect the configuration and disable unencrypted firewall management protocols.

4. Configure other firewall services and logging

Some firewalls can be configured to support other services, such as a Dynamic Host Configuration Protocol (DHCP) server, intrusion prevention system (IPS), and Network Time Protocol (NTP) server. It is important to also disable the extra services that will not be used.

Further, firewalls must be configured to report to a logging service to comply with and fulfill Payment Card Industry Data Security Standard (PCI DSS) requirements.

5. Test the firewall configuration

With the configurations made, it is critical to test them to ensure the correct traffic is being blocked and that the firewall performs as intended. The configuration can be tested through techniques like penetration testing and vulnerability scanning. Remember to back up the configuration in a secure location in case of any failures during the testing process.

6. Manage firewall continually

Firewall management and monitoring are critical to ensuring that the firewall continues to function as intended. This includes monitoring logs, performing vulnerability scans, and regularly reviewing rules. It is also important to document processes and manage the configuration continually and diligently to ensure ongoing protection of the network.

What is Firewall Configuration and Why is it Important? | Fortinet (2024)

FAQs

What is Firewall Configuration and Why is it Important? | Fortinet? ›

A firewall plays a vital role in network security and needs to be properly configured to keep organizations protected from data leakage and cyberattacks. This is possible by configuring domain names and Internet Protocol (IP) addresses to keep the firewall secure.

What is firewall configuration and why is it important? ›

Firewall configuration involves configuring domain names and Internet Protocol (IP) addresses and completing several other actions to keep firewalls secure. Firewall policy configuration is based on network types called “profiles” that can be set up with security rules to prevent cyber attacks.

What is a firewall and why is it important? ›

Firewalls provide protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic. Firewalls can also prevent malicious software from accessing a computer or network via the internet.

Why is it important to keep a firewall configuration up to date? ›

Updated firewalls support the latest security protocols and access permissions (IAM), which are essential for safeguarding your network against modern threats. Moreover, regular updates optimize network performance, providing improved visibility and control over network traffic.

What are the three configurations of firewalls explain? ›

The three configurations of firewalls are packet filtering, stateful inspection, and proxy server (application-level gateway).

Which firewall configuration is more secure and why? ›

Proxy servers are the most secure type of firewall, as they filter packets through a protected proxy server. This is done before traffic even reaches the network perimeter.

Why is it important to configure the host firewall? ›

Host-based firewalls help detect and stop viruses, malware and other malicious scripts that may not have been caught by network security. When a host-based firewall is regularly updated and running on an individual computer, the individual computer is protected against viruses and other malicious software.

What is a firewall in simple terms? ›

A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.

What are the three types of firewalls? ›

There are mainly three types of firewalls, such as software firewalls, hardware firewalls, or both, depending on their structure. Each type of firewall has different functionality but the same purpose. However, it is best practice to have both to achieve maximum possible protection.

What is the purpose of the firewall and is it important for the firewall to be stateful? ›

Stateful firewalls can detect when illicit data is being used to infiltrate the network. A stateful inspection firewall also has the ability to log and store important aspects of network connections. Stateful firewalls have no need for many ports to be open to facilitate smooth communication.

Why are firewalls an important consideration on a network? ›

Significance of firewalls

Firewalls offer protection against common network threats and attacks, making them indispensable in the face of increasing sophistication of cyberthreats. Beyond network security, firewalls also aid organizations in meeting compliance requirements and adhering to industry best practices.

Why is firewall management important? ›

Firewall management is vital to maintaining a secure network, mitigating the risks from cyber threats. An organization will likely have an array of different systems, devices, and related firewalls across its network.

What is the main function of a firewall? ›

A firewall is a security system designed to prevent unauthorized access into or out of a computer network. Firewalls are often used to make sure internet users without access are not able to interface with private networks, or intranets, connected to the internet.

What 3 things does a firewall do? ›

Firewalls protect against unauthorized access, malicious software, and cyberattacks. They prevent harmful entities like hackers, viruses, and worms from infiltrating or exfiltrating sensitive data. These are a few examples of things firewalls defend computers or networks from.

Should firewall settings on or off? ›

Important: Turning the firewall off may increase the risk to your device or data. We recommend leaving it on unless you absolutely need to turn it off.

What is a firewall configuration standard? ›

Firewall security standards are a set of guidelines and requirements designed to ensure the secure configuration and management of firewalls. They encompass a wide range of factors such as firewall policy, inbound and outbound traffic, stateful packet filtering, firewall configuration, IP addresses, and rulesets.

What is Windows Firewall configuration? ›

Windows Firewall can be configured to block or allow network traffic based on the services and applications that are installed on your device. This allows you to restrict network traffic to only those applications and services that are explicitly allowed to communicate on the network.

Top Articles
Passenger dies after jumping off world’s largest cruise ship
Rotterdam or Amsterdam which city suits you better?
What Is Single Sign-on (SSO)? Meaning and How It Works? | Fortinet
Skigebiet Portillo - Skiurlaub - Skifahren - Testberichte
Free VIN Decoder Online | Decode any VIN
Draconic Treatise On Mining
83600 Block Of 11Th Street East Palmdale Ca
Horned Stone Skull Cozy Grove
World of White Sturgeon Caviar: Origins, Taste & Culinary Uses
Uc Santa Cruz Events
Craigslist/Phx
Pwc Transparency Report
Miami Valley Hospital Central Scheduling
Gfs Rivergate
Where does insurance expense go in accounting?
Springfield Mo Craiglist
Viprow Golf
Mile Split Fl
Used Sawmill For Sale - Craigslist Near Tennessee
Hollywood Bowl Section H
Weepinbell Gen 3 Learnset
Nhl Tankathon Mock Draft
Unforeseen Drama: The Tower of Terror’s Mysterious Closure at Walt Disney World
Grimes County Busted Newspaper
Mj Nails Derby Ct
CVS Health’s MinuteClinic Introduces New Virtual Care Offering
Firefly Festival Logan Iowa
Ocala Craigslist Com
Ncal Kaiser Online Pay
101 Lewman Way Jeffersonville In
A Plus Nails Stewartville Mn
Opsahl Kostel Funeral Home & Crematory Yankton
Quality Tire Denver City Texas
Blackstone Launchpad Ucf
Diana Lolalytics
D3 Boards
Pitchfork's Top 200 of the 2010s: 50-1 (clips)
Mydocbill.com/Mr
Snohomish Hairmasters
Stafford Rotoworld
10 games with New Game Plus modes so good you simply have to play them twice
Oriellys Tooele
Mvnt Merchant Services
Check From Po Box 1111 Charlotte Nc 28201
Lbl A-Z
Craigslist Binghamton Cars And Trucks By Owner
Gli italiani buttano sempre più cibo, quasi 7 etti a settimana (a testa)
Tom Kha Gai Soup Near Me
Sc Pick 3 Past 30 Days Midday
Parks And Rec Fantasy Football Names
Access One Ummc
Latest Posts
Article information

Author: Kerri Lueilwitz

Last Updated:

Views: 6043

Rating: 4.7 / 5 (67 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Kerri Lueilwitz

Birthday: 1992-10-31

Address: Suite 878 3699 Chantelle Roads, Colebury, NC 68599

Phone: +6111989609516

Job: Chief Farming Manager

Hobby: Mycology, Stone skipping, Dowsing, Whittling, Taxidermy, Sand art, Roller skating

Introduction: My name is Kerri Lueilwitz, I am a courageous, gentle, quaint, thankful, outstanding, brave, vast person who loves writing and wants to share my knowledge and understanding with you.