|
I don't know your equipment, but in general when creating any kind of IT security infrastructure we adopt the posture of "deny by default and allow by exception."
So one starts out with a rules list with nothing in it apart from maybe a "catch all" that denies everything (nomenclature varies a bit across platforms - some may need you to explicitlt code a deny all catchall, some may do so by default.) Then we gradually add in rules to permit what we want. Thusly we end up with a set of rules coded to mostly "permit" stuff with relatively few, if any, rules to "deny" things as that is the default action.
A lot of platforms process rules in some kind of ranked order and - this is the important bit - as soon as a rule is encountered that "hits," no further rules are evaluated, even if there is something that's a better match further down the list. You'll need to check your platforms manuals to see if it works in this way.
So, for example, if I had some rules (evaluated top to bottom...)
send all traffic from washing machine to mars
send all traffic from internal network to venus
send all traffic from dish washer to mercury
drop all traffic
... the bottom two rules never do anything as the second rule is catching everything from my internal network.
"Out of the box" most SOHO firewall tend to allow everything out and nothing in. Some SOHO kit doesn't even have the facility to stop stuff going out. If yours does, you could adopt the same process of blocking all outbound then gradually open things up as you discover what is needed. Though this will likely elicit a marked downturn in domestic harmony as the Internet stops working and you have to figure out what outbound ports to open up. |
|