ISO/IEC 18028-3:2005

Information technology -- Security techniques -- IT network security -- Part 3: Securing communications between networks using security gateways

ISO/IEC 18028-3:2005 provides an overview of security gateways through a description of different architectures.

It outlines the techniques for security gateways to analyse network traffic. The techniques discussed are as follows:

  • packet filtering,
  • stateful packet inspection,
  • application proxy,
  • network address translation,
  • content analysing and filtering.

Additionally, ISO/IEC 18028-3:2005 provides guidelines for the selection and configuration of security gateways. It gives guidance to choose the right type of architecture for a security gateway, which best meets the security requirements of an organization.


General information

  • Current status : Withdrawn
    Publication date : 2005-12
  • Edition : 1
  • :
    ISO/IEC JTC 1/SC 27
    IT Security techniques
  • 35.030
    IT Security

Got a question?

Check out our FAQs


Customer care
+41 22 749 08 88

Opening hours:
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)