Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Protecting Information Systems with Firewalls: Revised Guidelines on Firewall Technologies and Policies

Published

Author(s)

Shirley M. Radack

Abstract

Firewalls are essential devices or programs that help organizations protect their networks and systems, and help home users protect their computers, from hostile attacks, break-ins, viruses, and malicious software. Firewalls control the flow of network traffic between networks and between hosts that employ different security policies. Firewalls were originally installed at the perimeter of networks, where hostile threats from external intruders could be detected and stopped. While these early firewalls provided some protection for an organization s internal systems, they could not recognize all instances and all forms of attack. For example, attacks sent from one internal host to another often did not pass through the network firewalls, and viruses and malicious code could not be detected. Networks can now be designed to provide protection at the network perimeter as well as at other network locations and to detect both external and internal attacks. Firewalls can now be used to restrict connectivity to and from internal networks that process personal information and carry out sensitive functions, such as accounting and personnel tasks. Firewalls can provide an additional layer of security by preventing unauthorized access to systems and information, and they can protect mobile devices that are placed directly onto external networks. To help organizations use today s firewall technology effectively, the National Institute of Standards and Technology (NIST) recently revised its guide to firewall technology and the development of firewall policies.
Citation
ITL Bulletin -

Keywords

enterprise security, firewalls, network security, security policies, security threats

Citation

Radack, S. (2009), Protecting Information Systems with Firewalls: Revised Guidelines on Firewall Technologies and Policies, ITL Bulletin, National Institute of Standards and Technology, Gaithersburg, MD, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=904197 (Accessed March 4, 2024)
Created October 29, 2009, Updated February 19, 2017