A Toolkit and Methods For Internet Firewalls: Marcus J. Ranum Frederick M. Avolio Trusted Information Systems, Inc
A Toolkit and Methods For Internet Firewalls: Marcus J. Ranum Frederick M. Avolio Trusted Information Systems, Inc
Marcus J. Ranum
Frederick M. Avolio
Audit Logs
Maintained
Bastion Host
SMTP Applications
FTP relayed via
TELNET proxies
rlogin
way. The configuration rules are designed to provide
The toolkit is designed to build a host-
both configuration and service and access
based firewall, with security being enforced by a
permissions information, being read top-to-bottom
single bastion host. For ease of management, all the
and left-to-right. Hostnames or IP addresses
proxies and access control tools use a single
including simple wildcards can be used in
configuration file with a regular syntax. We thought
configuration rules, but IP addresses are preferred
this was useful due to the generally complex
since DNS addresses are vulnerable to spoofing.
configuration of various publicly available firewall
tools, of which no two are configured in the same