SlideShare a Scribd company logo
Configuring Your
Hardware Firewall
Presented by:
Chad Brown
Amber Williams
866-528-9313 | AventisSystems.com
Hardware Firewalls
866-528-9313 | AventisSystems.com
Potential Intrusions
Can Take Many Forms:
Attackers who steal data
Attackers who host pirated software on your hardware
Proper Implementation of Firewalls:
Ward off threats
Keep data safe
866-528-9313 | AventisSystems.com
Inbound Traffic Control
Only Ports Open = Required for Communication
Examples:
Port 80 for Internet Access (HTTP)
Port 443 for Secure Internet Access (HTTPS)
Port 25 for Emails (SMTP)
866-528-9313 | AventisSystems.com
Open Ports for Applications
Additional Open Ports for Applications
Most enterprise software open ports during installation
866-528-9313 | AventisSystems.com
Outbound Traffic Control
Prevent Sending of Certain Files or Data Outside Network
Prevent Users from Accessing Certain Sites
Examples:
Social Networks
eCommerce Sites
866-528-9313 | AventisSystems.com
Ensure Internal Transmission
Utilize a Demilitarized Zone (DMZ)
Sensitive data can be shared internally
Private
Resources
Private
Resources
Internet
Internal
Firewall
Server-side
Firewall
Demilitarized Zone (DMZ)
866-528-9313 | AventisSystems.com
DMZ Tips
DMZ Setup Tips
Use Multiple Appliances & Configurations
Each employee has own rights within DMZ
Name each device with individual IP address
Do not use actual name or URL
Intruders not pointed to device with sensitive data
866-528-9313 | AventisSystems.com
Take a Look
Advanced IT Services - Network & Security Solutions
http://www.aventissystems.com/Network-and-Security-Solutions-s/8262.htm
Hover & Click
866-528-9313 | AventisSystems.com
Sign Up
www.AventisSystems.com
866-528-9313 | AventisSystems.com
Follow Us
@AventisSystems

More Related Content

PDF
Firewall architectures
PPTX
Firewalls and packet filters
PDF
PPTX
Firewall & packet filter new
PPT
Firewall Architecture
PPTX
Firewalls
PPTX
Firewall and its types and function
PDF
FIREWALL
Firewall architectures
Firewalls and packet filters
Firewall & packet filter new
Firewall Architecture
Firewalls
Firewall and its types and function
FIREWALL

What's hot (20)

PPT
Intoduction to Network Security NS1
PPT
Data security in local network using distributed firewall ppt
PPTX
Firewall and its purpose
PPTX
Security Benefits of Firewall Protection
PPTX
Firewall
PPTX
Introduction of firewall slides
PDF
Network firewall function & benefits
PPTX
Firewall and It's Types
PPTX
fire walls
PPTX
Firewall presentation
PPTX
Firewall
PPT
Firewall
PPT
FireWall
PPT
Firewalls
PPT
Firewall & its configurations
PPTX
firewall
PPTX
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
PPT
Firewall
PPTX
Firewall presentation
Intoduction to Network Security NS1
Data security in local network using distributed firewall ppt
Firewall and its purpose
Security Benefits of Firewall Protection
Firewall
Introduction of firewall slides
Network firewall function & benefits
Firewall and It's Types
fire walls
Firewall presentation
Firewall
Firewall
FireWall
Firewalls
Firewall & its configurations
firewall
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall
Firewall presentation
Ad

Viewers also liked (7)

PPT
PDF
Projekt 2009 - SOS fra de sure SOSUer FINAL
DOC
Mariselvam
DOCX
More charitable deductions possible
PPTX
View wtcc slovakia 2015
DOC
Digital watt meter with current and voltage display
PDF
JOB PROFILE -HR CONSULTANT
Projekt 2009 - SOS fra de sure SOSUer FINAL
Mariselvam
More charitable deductions possible
View wtcc slovakia 2015
Digital watt meter with current and voltage display
JOB PROFILE -HR CONSULTANT
Ad

Similar to Configuring Your Hardware Firewall (20)

PPTX
Firewalls
PPTX
Cyber security issues
PPT
Web Server Technologies Part III: Security & Future Musings
PPT
New internet security
PPT
NewIinternet security
PPTX
Firewall (Network Firewall used by Network)
PPT
Dark Alleys Part2
PDF
Cybesecurity of the IoT
PPT
Chapter_Five[1].ppt
PPTX
Assignment on windows firewall
PDF
PDF
RAZORPOINT SECURITY GLOSSARY
PPT
Ch13 Protecting Networks with Security Devices
PPTX
Institutional IT Security
PPTX
firewallpresentation-100826052003-phpapp02.pptx
PPS
Internetworking With Pix Firewall
PPT
Firewall Modified
PPT
Ch04 Network Vulnerabilities and Attacks
PPT
PDF
Internal penetration test_hitchhackers_guide
Firewalls
Cyber security issues
Web Server Technologies Part III: Security & Future Musings
New internet security
NewIinternet security
Firewall (Network Firewall used by Network)
Dark Alleys Part2
Cybesecurity of the IoT
Chapter_Five[1].ppt
Assignment on windows firewall
RAZORPOINT SECURITY GLOSSARY
Ch13 Protecting Networks with Security Devices
Institutional IT Security
firewallpresentation-100826052003-phpapp02.pptx
Internetworking With Pix Firewall
Firewall Modified
Ch04 Network Vulnerabilities and Attacks
Internal penetration test_hitchhackers_guide

More from Aventis Systems, Inc. (20)

PPTX
Remote Desktop Services - Who Needs It?
PPTX
The Importance of Endpoint Protection - Featuring SEP 14
PPTX
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
PPTX
Windows Server 2016 Licensing Tips
PPTX
The Case for SSDs - Market Domination & Why You Need Them in Your Environment
PPTX
Benefits of Upgrading to Windows 10 in the Government Sector
PPTX
Why Government Agencies Should Consider Dell 13th Gen Servers
PPTX
Tech Spec Roundup - All-in-One Desktop PCs
PPTX
SMB Benefits of VPS Solutions - Availability, Security, and Support
PPTX
Attaching Storage to Blade Infrastructure
PPTX
Out-of-Band Management - Why Standard Doesn’t Cut It
PPTX
Government IT Budgets: Spend Now to Save Later
PPTX
Veeam Backup Essentials v9 Overview
PPTX
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
PPTX
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
PPTX
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
PPTX
RIP SQL Server 2005 - Time to Move On!
PPTX
What to Do with Your Used IT Hardware
PPTX
Networking Considerations for IT Labs
PPTX
Don’t Get Caught by Phishing Emails!
Remote Desktop Services - Who Needs It?
The Importance of Endpoint Protection - Featuring SEP 14
Keep Your Data Safe & Backup Like a Pro [from Live Webinar on 1-18-17]
Windows Server 2016 Licensing Tips
The Case for SSDs - Market Domination & Why You Need Them in Your Environment
Benefits of Upgrading to Windows 10 in the Government Sector
Why Government Agencies Should Consider Dell 13th Gen Servers
Tech Spec Roundup - All-in-One Desktop PCs
SMB Benefits of VPS Solutions - Availability, Security, and Support
Attaching Storage to Blade Infrastructure
Out-of-Band Management - Why Standard Doesn’t Cut It
Government IT Budgets: Spend Now to Save Later
Veeam Backup Essentials v9 Overview
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - Windows Server 2003 to 2012 R2 Upgrade Best P...
RIP SQL Server 2005 - Time to Move On!
What to Do with Your Used IT Hardware
Networking Considerations for IT Labs
Don’t Get Caught by Phishing Emails!

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Electronic commerce courselecture one. Pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Programs and apps: productivity, graphics, security and other tools
Network Security Unit 5.pdf for BCA BBA.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx
Spectroscopy.pptx food analysis technology
MIND Revenue Release Quarter 2 2025 Press Release
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
20250228 LYD VKU AI Blended-Learning.pptx
Spectral efficient network and resource selection model in 5G networks
Building Integrated photovoltaic BIPV_UPV.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Electronic commerce courselecture one. Pdf
A Presentation on Artificial Intelligence
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation

Configuring Your Hardware Firewall

Editor's Notes

  • #2: Firewalls play a key role in keeping cyber criminals from accessing your company’s network. In this webinar ‘Configuring Your Hardware Firewall’ we’re covering setup suggestions to keep your business safe.
  • #3: Hardware Firewalls are important for your infrastructure because they monitor all inbound and outbound network traffic. This allows the device to identify and block any potential intrusions.
  • #4: These potential intrusions can take many forms, such as someone trying to steal company data or someone using your hardware and bandwidth to host pirated software. Ensuring proper implementation of the device will help to ward off these types of threats and help keep your company data safe. Kyle Interjection Great point Chad! What kind of tips do you have for setting up the device?
  • #5: It is important to ensure that the only ports open to the outside are ports required for important data communication. For example, port 80 allows internet access and port 443 will allow secure internet access (HTTPS). Closing these ports would disallow access by employees. Another important port to leave open is 25 (SMTP for emails).
  • #6: While these are sufficient for email and browsing work, you will need additional ports for other applications Most enterprise software will open the port during the installation that is required.
  • #7: Firewalls can also prevent employees from sending certain types of files or sensitive data outside of the network. They can also prevent users from accessing certain types of sites, such as social networking and shipping. Kyle Interjection That’s great information Chad, but what if I want to send a sensitive file to another employee?
  • #8: While keeping transmission from outside is very important, it is equally as important to ensure that you are not disallowing data transmission from within the company Set up a Demilitarized zone (DMZ) within the organization so that sensitive data can still be shared from within
  • #9: Using multiple appliances and configurations will allow you to also ensure that each employee has their own rights within the DMZ so that employees cannot share information with someone who should not see it When attaching these different devices, best practice is to name each device by an individual IP address as opposed to a name or URL. This helps ensure that if someone does gain access to your system, they are not immediately pointed to the device housing sensitive data Kyle Wrap-up & Close Thanks, Chad!
  • #10: To our viewers, we want to point out the Advanced IT Services offered by Aventis Systems include network & security services such as firewall configuration and testing. Take a look at our full portfolio of services that we designed with the most pressing needs of small and midsize organizations in mind.
  • #11: And make sure you sign up for our emails to receive product specials and keep up with our resources for IT pros including webinars, blog articles, and more.
  • #12: You can also stay up-to-date by following us on Facebook and Twitter @AventisSystems.