Topics Map > University of Chicago > IT Services > Accounts, Identity, & Security > Security

Group Firewalls

This article provides information about group firewalls.

Group firewalls are firewalls which protect services which have a specific set of criteria:

  • There are multiple machines in a clump which provide a single service to its users.
  • The single service is easily protected by a firewall.
  • Due to the nature of the communications between the machines in the clump, it is impossible to firewall each machine individually.
  • There is a clear and compelling reason for the clump of machines to be behind a firewall.

For example, a cluster of web servers acting in high availability mode providing sensitive data may qualify. In this example, all access to the service is via the web and is a single service. This meets the first criteria. Web sites are easy to firewall as all communication happens over one or two ports (tcp 80 and/or 443), so the second criteria is met. Many setups for high availability cause traffic to be difficult to firewall, often because the network traffic between machines is poorly defined or a proprietary protocol. This meets the third criteria. As there is sensitive data stored on the cluster, there is an important reason for the system to be behind a firewall.

Group firewalls must still abide by the general requirements for firewalls on the University's network. Group firewalls must be managed by someone qualified to manage the firewall and must be maintained in accordance to IT Services’ recommendations for firewalls.

Keywords:security safety clump ports   Doc ID:19497
Owner:Mike R.Group:University of Chicago
Created:2011-08-03 19:00 CDTUpdated:2016-08-12 10:21 CDT
Sites:University of Chicago, University of Chicago - Sandbox
Feedback:  0   0