HostedDB - Dedicated UNIX Servers

No Title


Next: Contents


Abstract

This document provides an overview of the Internet and security-related problems. It then provides an overview of firewall components and the general reasoning behind firewall usage. Several types of network access policies are described, as well as technical implementations of those policies. Lastly, the document contains pointers and references for more detailed information.

The document is designed to assist users in understanding the nature of Internet-related security problems and what types of firewalls will solve or alleviate specific problems. Users can then use this document to assist in purchasing or planning a firewall.

This work is a contribution
of the National Institute of Standards and Technology,
and is not subject to copyright.

Because of the nature of this report, it is necessary to mention vendors and commercial products. The presence or absence of a particular trade name product does not imply criticism or endorsement by the National Institute of Standards and Technology, nor does it imply that the products identified are necessarily the best available.

Acknowledgments

The National Institute of Standards and Technology would like to thank the following individuals who reviewed drafts of this document and advised on document structure and content: David Curry of Purdue University, Uwe Ellermann of the DFN-CERT in Germany, and Stephen Weeber of the Department of Energy's Computer Incident Advisory Capability (CIAC).





John Wack
Thu Feb 9 18:17:09 EST 1995