Security

Handling Stateful Firewall Anomalies

Download Now Free registration required

Executive Summary

A security policy consists of a set of rules designed to protect an information system. To ensure this protection, the rules must be deployed on security components in a consistent and non-redundant manner. Unfortunately, an empirical approach is often adopted by network administrators, to the detriment of theoretical validation. While the literature on the analysis of configurations of first generation (stateless) firewalls is now rich, this is not the case for second and third generation firewalls, also known as stateful firewalls. In this paper, the authors address this limitation, and provide solutions to analyze and handle stateful firewall anomalies and mis-configuration.

  • Format: PDF
  • Size: 267.27 KB