Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network.
First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network. This will also help all communication to be automatically encrypted.
Since port 23(Telnet ) helps to access a remote computers from all the department of the …show more content…
Since its necessary to maintain a consistent DNS server and DNS data base, I will block most queries from outside DNS to ensure consistency in the company DNS database and DNS servers. Also attackers will not be able to retrieve DNS information through queries. I will Configuring the DNS servers to permit zone transfers to only legitimate users. I will choose pot 110 as default to use the company standard port for POP3 connections over TCP/IP. I will make sure that POP3 service is controlled which will makes users who are not allowed to access the server to not access mail through the POP3 service.
Because Port 111 is a place to find out which and where services are running. Without blocking this port, company is more vulnerable to attackers. Also without blocking this port remote attackers will be able to trick the service into executing arbitrary commands on the system with root privileges. I will always, keep up-to-date on patches and releases to best protect the company network.
Port 143 IMAP will also be blocked to secure the company