Area | Firewalls |
---|
Page Type | Content |
---|
Page Name | Firewalls : FAQ |
---|
Last Updated | 24/01/24 |
---|
Update Notes | |
---|
Reviewed | 24/01/24 |
---|
Reviewer | JC/NF |
---|
Next Review | 24/07/24 |
---|
Links checked | 16/09/24 |
---|
|
The below will appear on the Refined page at Firewalls : FAQ
QUESTION | ANSWER |
---|
Why is it important to have a firewall? | Firewalls main article | What is a software firewall? | | Are home routers supplied by Internet Service Providers in scope? | . | What is a VPN? | A VPN or Virtual Private Network is a way of encrypting your information so that it cannot easily be intercepted or read by a third party. | What is a port? | | What does ‘correctly configured’ mean for a firewall in a Cyber Essentials assessment? | You must change the default password, prevent internet access to the firewall configuration, and block unauthenticated inbound connections. In addition any firewall rules for inbound connections must be approved and documented, and any unnecessary firewall rules should be removed when not needed. | What should be done if a device is connecting to a network that isn’t controlled by the organisation, such as a public wifi hotspot? | You need to ensure that the software firewall is configured on your device (for example, Windows Defender or MacOS firewall). | When using a third-party network (e.g. in a managed office) where details of the firewall or router are unavailable, how do we meet the firewall requirements? | If the third party is unwilling or unable to provide the details of their firewall or router, you need to use software firewalls on the end user devices or install your own device to use as the boundary. | How can you tell if a router has a firewall built in? | | Is a such as NordVPN considered compliant for Cyber Essentials? | Commercial VPNs are not considered compliant because there is no control of the internet boundary. You don’t have any control over the gateways and no central policy management or centralised management console are involved. An acceptable VPN solution should have a secure tunnel to corporate systems behind a managed firewall or be a cloud solution with centralised policy management system. |
|