The earliest implementation of the firewall at Palo Alto was a DEC unix based system, with what at the time was an unusual two NIC cards. The computer was situated between their internet connection and their web server, and ran a program called gated. The configuration was referred to as a "bastion host" (see below.) Gated was a fairly simple application. It examined the source address of a packet, and if the address was on a list of known malicious sources, it was dropped, otherwise, it was forwarded out the second NIC to the web server. Outbound packets were not filtered and gated had to be re-compiled to add new hosts. The policy had to be allow unless denied. The firewall worked entirely at the network layer.
http://lib.ru/SECURITY/firewall-faq/firewall-faq.txt_with-big-pictures.html |
Clearly, there were some great limitations to this approach going forward. One had to know the malicious sites ahead of time, and the firewall was not at all selective about services. Later firewalls would become much more flexible and effective, allowing security minded companies to switch over to a deny unless allowed stance, which is much more secure.
No comments:
Post a Comment
I look forward to your thoughts and open debate. Please share appropriate and professional comments. Inappropriate comments are subject to removal.