![]() ![]() While managing outbound traffic introduces a certain level of complexity into an environment, it is becoming a popular network security approach. Other firewall systems look for outbound malware and security-related threats, including DNS lookups to hosts known to be threatening or even blocklisted. They often tie into the business's directory service - Active Directory and Lightweight Directory Access Protocol - so they can provide access, filtering and reporting based on each user's network account. ![]() Such systems often perform targeted functions, like content filtering for email or web browsing. ![]() Sometimes, a dedicated firewall appliance or an off-site cloud service, such as a secure web gateway, is used for outbound traffic because of the specialized filtering technologies necessary. Inbound traffic originates from outside the network, while outbound traffic originates inside the network. Customizable firewall rules enable specific ports, services and IP addresses to connect in or out. The configuration of firewalls can be business-, network- and risk-specific, so the configuration for a manufacturing business's firewall, for example, will likely be different than that of a cloud service provider's firewall. The difference between inbound and outbound firewall rules Firewalls are typically designed to prevent inbound traffic from entering a network, but they can also prevent outside connections from receiving outbound traffic. Outbound requests, on the other hand, originate from inside the network, destined for services on the internet or outside network. The inbound requests originate from outside parties, such as a user with a web browser, an email client, a server or application making service requests, like FTP and SSH, or API calls to web services. Enterprise networks have inbound traffic and outbound traffic. ![]()
0 Comments
Leave a Reply. |