What makes a risky firewall rule?
Risky firewall rules allow access to a host or server from the Internet on an insecure protocol or service. If you need to make this service or application accessible to the outside world please try and limit it as much as possible. If all your users are on campus you can limit the access to campus. If the users are affiliated with Stanford but some are off campus you can have them use the public VPN. If the users are off campus and not affiliated with Stanford only then you will need to open the service up to the outside world. The smaller the hole you open in the firewall the better.
Related Questions
- How do I create an firewall rule that permits a range of addresses, as defined in a network/host object, but negates selected addresses within that range?
- If I want to allow all traffic temporarily (for whatever reason), does the Personal Firewall rule "allow all (bi-directional)" allow all traffic?
- How can I block/permit a range of IP addresses in a firewall rule?