<p dir="ltr">Strictly talking about network perimeter firewalls here, not personal firewalls like Windows Firewall or the like:<br></p>
<p dir="ltr">Network perimeter firewall configuration best practice suggests that blocking should occur in both directions by default, with exceptions being made as required. That means no network traffic INTO the network...AND no traffic OUT of the network without specific exceptions being made.</p>
<p dir="ltr">By default, however, most SOHO and mid-level firewalls come configured to block all inbound traffic but PERMIT all outbound traffic. This is a much easier configuration for novice firewall admins to work with because it doesn't prevent LAN computers from doing anything at all that they care to do.</p>
<p dir="ltr">On my own business network, I block all in and outbound traffic and make exceptions as required. However, I haven't implemented outbound blocking at any library yet. I'm considering it.</p>
<p dir="ltr">If I do implement, I think I could only realistically do it for staff LANs. Those are the most controlled environments, with known applications doing known things.</p>
<p dir="ltr">I don't think it would be wise to try to implement for patron computer LANs or for patron wifi though. There is just no way to know what exceptions to make for every use case. I could make exceptions to let Roblox or Minecraft work, but it would be a constant battle to keep up on all the latest popular software and their individual requirements. </p>
<p dir="ltr">So my (first) question is simply this: Do any of you currently block outbound network traffic on any segment of your LAN?<br><br></p>
<p dir="ltr">Thanks, <br>
Chad </p>
<p dir="ltr">___________________________________<br>
Chad Neeper<br>
Senior Systems Engineer</p>
<p dir="ltr">Level 9 Networks<br>
740-548-8070 (voice)<br>
866-214-6607 (fax)</p>
<p dir="ltr">Full IT/Computer consulting services -- Specialized in libraries and schools</p>