Firewalling

One of the central tasks of a firewall is checking the data traffic passed through a network. The protocols of the lower network and transport layers (IP, IPv6, TCP, UDP, SCTP, ICMP) are primarily addressed and the traffic is validated against a defined set of rules. This can also protect against the inadvertent offering of network services.

A firewall is also used when a so-called demilitarized zone (DMZ) is required. Here, firmly defined services are deliberately exposed to an untrustworthy network such as the Internet or a partner VPN and the remaining access is denied.

  • Authentication
  • Confidentiality with encryption
  • Integrity with checksums
A generic square placeholder image with rounded corners in a figure.

We can offer and set up firewalls in different architectures and variations such as "Web Application Firewall", "Screening" or "DMZ". Beyond the product, the focus is primarily on the derivation, setup and subsequent review (audit) of the set of rules in theory and practice.

The sensible use of a firewall within your network or in front of your dedicated server always requires a comprehensive analysis of the target environment in order to rule out pitfalls such as a non-existent common point of trust due to parallel connections. That is why comprehensive advice is important. Talk to us if you would like to use firewall solutions in our data center or in the company.