Internet Security

Skip to Main Content »

Have a Question? We Can Help!
Call Toll-Free 866.403.5305

Welcome to Firewalls.com.

You're currently on:

Dell SonicWALL releases new NSA 2600

Wednesday, October 2, 2013 12:32:56 AM America/New_York

nsa 2600Aimed at meeting your growing speed and security requirements, the release of the Dell SonicWALL NSA 2600 delivers incredibly high security effectiveness and throughput in addition to providing one of the best values available for small- to medium-sized organizations.The NSA 2600 is designed specifically with the needs of growing small businesses, branch offices and school campuses in mind. Read More

Dell SonicWALL Releases SonicOS 5.9

Friday, August 23, 2013 9:45:25 AM America/New_York

We're proud to announce the release of SonicOS 5.9 firmware for our 5th Generation firewalls including the TZ, Network Security Appliance (NSA) and E-Class NSA Next-Generation Firewall (NGFWs). SonicOS 5.9 delivers more than 45 new features that address small business as well as distributed enterprise requirements. Read More

How Intrusion Prevention Systems (IPS) Work in Firewall?

Tuesday, July 23, 2013 6:11:27 PM America/New_York

An Intrusion Prevention System (IPS) is a security solution that provides security against unauthorized access and malicious activities at the network level. Unlike Intrusion Detection System that only monitors the network traffic, an Intrusion Prevention System also ensures protection against intrusions that takes place on the network Read More

How Port Forwarding Works in Firewalls?

Tuesday, July 9, 2013 2:10:29 PM America/New_York

Port forwarding is a process in which any intermediary device, typically a firewall and/or a router, that connects the internal network to the external network receives the incoming requests from the untrusted network, typically the Internet, and forwards the requests to the corresponding internal server computers, that have been assigned with the private IP addresses according to the internal network addressing scheme. Read More

Understanding NetFlow/IPFIX

Sunday, June 30, 2013 2:29:01 PM America/New_York

NetFlow is a protocol which is developed by Cisco and is used to collect network traffic for monitoring and analyzing purposes. Initially NetFlow was supported only by Cisco products. However now it has become a company standard protocol and is compatible with various other platforms as well. Read More

How Stateful Packet Inspection (SPI) Works in Firewalls?

Monday, June 24, 2013 6:44:21 PM America/New_York

Stateful Packet Inspection or SPI, which is sometimes also referred to as Dynamic Packet Inspection, is the process in which incoming and outgoing packets are deep inspected dynamically for their authenticity. Stateful Packet Inspection is mostly performed by the layer 3 devices such as firewalls or routers. When a firewall is configured for Stateful Packet Inspection, it monitors the network connections, records the current status of a packet as it leaves the interface, and tracks it until the packet reaches to its correct destination host. Read More

Understanding Dynamic Bandwidth Management

Monday, June 17, 2013 2:21:06 PM America/New_York

Dynamic Bandwidth Management is a feature in some latest security appliances and allows the administrators to efficiently manage or shape up the entire Internet traffic when a single ISP link is shared among multiple users in an organization.With the help of Dynamic Bandwidth Management utility, administrators can manage the overall utilization of the Internet connection by limiting the excessive consumption of the bandwidth by any web application. Read More

How Port Aggregation Works in Firewalls?

Sunday, June 9, 2013 8:34:35 AM America/New_York

Port aggregation is a process in which multiple ports of a network device, such as a firewall, a LAN switch or a server are combined together to work as a single LAN port. The benefit of configuring port aggregation on a network device is that the device can support increased throughput while handling heavy network traffic. Read More

How IPsec VPN Site-to-Site Tunnels Work?

Monday, May 27, 2013 8:23:50 PM America/New_York

In order to understand how IPsec VPN site-to-site tunnels work, it is important to fully understand what each term individually means, and what part does each of the mentioned object play in a complete IPsec VPN site-to-site network setup. This Article will help you to understand how the network communication takes place using the secure VPN tunnel.

Read More

How Intrusion Detection Systems (IDS) Works on Firewall?

Tuesday, May 7, 2013 10:39:16 PM America/New_York

An Intrusion Detection System or IDS is a security solution which, when deployed in a network, monitors the network traffic for malicious and suspicious activities, and alerts the security administrators by triggering the alarm. There is a misconception that an Intrusion Detection System is a firewall. Although both IDS and firewall are network security appliances, they differ in their functionality and the approach they take to monitor the network traffic. Read More

Subscribe to Our Blog

   Subscribe to Firewalls.com RSS   Subscribe to Firewalls.com Facebook   Follow Firewalls.com on Twitter   Follow Firewalls.com on YouTube

Join The Other SonicWALL Readers Just Like You.