Firewall Auditing

At Teceze, we carry out a broad range of reviewing firewall security reviews and providing firewall testing services. This requires us to audit the rule base and how it aligns with the industry's best practice. Utilizing a wide range of tools and scripts, we can carry out a detailed assessment on:

– Checkpoint
– Juniper
– Cisco
– Palo Alto.

The firewall audit undertaken by Teceze recognises weak protocols, insecure rules and further data leakages that could cause problems for the infrastructure of the firewall. Our team of cyber security experts are experienced in building firewalls from scratch and in implementing technology that comes with a number of the leading firewall retailers. This gives us the opportunity to see everything from the perspective of both the attacker and the defender. It enables us to carry out assessments that are some of the most arduous and thorough in our industry.

Firewall Design – How does it Work?

Designing a firewall involves the following five steps:

1. Identifying your organisational security needs. This is achieved through identifying the security requirements, assessing your security stance and then working with this information to identify your security requirements.


2. Outline a complete security policy that involves network resources, access policies, and authorisation controls. This makes it possible for the firewall to address all security needs and expectations.

3. Defining and configuring the firewall is made easy by identifying resources, applications, and services that will be protected from any threats from external entities and insider attacks.

4. Identify acceptable communications through an acceptable use policy that defines the different network activities that are permitted or not permitted on the LAN and the internet web services.

5. Firewall design is made around identifying enforcement points. Firewalls are implemented at the edge of all networks and are positioned between private LAN and public networks.

What can you do with firewall design?

Characterising the network, document the security stance and identifying the position of the business form a security perspective are all best practices.

Therefore you can:

1. Determine network resources and all security requirements
2. Spot known threats and understand how they should be dealt with
3. Document operating systems, versions and applications

How Our Clients Benefit?

  • – Weaknesses are identified and dealt with, to strengthen the infrastructure of the firewall
  • – Thorough assessments are carried out to deliver complete peace of mind
  • – A wide range of firewall security reviews are carried out
  • – Find rules that are excessively tolerant.

Security Perimeter design

Clearly identify the workflow for permitted
communications as well as access right that are based on the roles of employees and the requirements of the users.

The firewall enforcement points can be determined. A firewall can be introduced to protect the network from the outer edges, the core as well as the DMZ.

Our expert team is here to help with any questions you have regarding our products or services.  Fill out the form below or contact us on +44 0208 050 5014

Get a Quote

Number of employees in the company
Enter the Captcha