The differences between inbound and outbound firewall rules

<p>It is critical to compare the roles of inbound and outbound firewall rules before deploying a corporate firewall to ensure it properly secures an enterprise IT environment.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p>Inbound traffic originates from outside the network, while outbound traffic originates inside the network. Therefore, inbound firewall rules protect the network from unwanted incoming traffic from the internet or other networks — in particular, disallowed connections, malware and DDoS attacks. Outbound firewall rules control outgoing traffic, that is, requests to resources outside of the network. For example, a connection request to an email service or the Informa TechTarget website might be allowed, but connection requests to unapproved or dangerous websites are stopped.</p>
<p>A single <a href=”https://www.techtarget.com/searchsecurity/definition/firewall”>firewall</a> typically manages inbound and outbound firewall rules, but it’s essential to understand the differences between them.</p>
<section class=”section main-article-chapter” data-menu-title=”Inbound traffic versus outbound traffic”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Inbound traffic versus outbound traffic</h2>
<p>Enterprise networks have both inbound traffic and outbound traffic:</p>
<ul class=”default-list”>
<li><b>Inbound traffic requests.</b> They originate from outside the network, such as an external user with a web browser, email client, server or application making requests — like FTP and SSH — or API calls to web services.</li>
<li><b>Outbound traffic requests. </b>They originate from inside the network, destined for services on the internet or outside networks, such as a user visiting an external website or an internal mail server connecting to an external one.</li>
</ul>
<p>Firewalls are designed and deployed to prevent inbound traffic from entering a network and to stop outbound traffic from connecting to external resources that are noncompliant with an organization’s security policies.</p>
<div class=”youtube-iframe-contain

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: