Internet Security

Skip to Main Content »

Have a Question? We Can Help!
Call Toll-Free 1-866-403-5305

Welcome to

You're currently on:

Let’s Have a Party – Make it a Masquerade!

Wednesday, February 11, 2015 8:44:02 AM America/New_York

How a simple Masquerade rule could just be your ticket to...

Read More

GLIBC Vulnerability "The GHOST" found in Sophos Firewalls

Monday, February 2, 2015 12:11:10 PM America/New_York

A critical update is necessary to remove a Linux vulnerability affecting Sophos ... Read More

Dell SonicWALL releases new NSA 2600

Wednesday, October 2, 2013 12:32:56 AM America/New_York

nsa 2600Aimed at meeting your growing speed and security requirements, the release of the Dell SonicWALL NSA 2600 delivers incredibly high security effectiveness and throughput in addition to providing one of the best values available for small- to medium-sized organizations.The NSA 2600 is designed specifically with the needs of growing small businesses, branch offices and school campuses in mind. Read More

Dell SonicWALL Releases SonicOS 5.9

Friday, August 23, 2013 9:45:25 AM America/New_York

We're proud to announce the release of SonicOS 5.9 firmware for our 5th Generation firewalls including the TZ, Network Security Appliance (NSA) and E-Class NSA Next-Generation Firewall (NGFWs). SonicOS 5.9 delivers more than 45 new features that address small business as well as distributed enterprise requirements. Read More

How Intrusion Prevention Systems (IPS) Work in Firewall?

Tuesday, July 23, 2013 6:11:27 PM America/New_York

An Intrusion Prevention System (IPS) is a security solution that provides security against unauthorized access and malicious activities at the network level. Unlike Intrusion Detection System that only monitors the network traffic, an Intrusion Prevention System also ensures protection against intrusions that takes place on the network Read More

How Port Forwarding Works in Firewalls?

Tuesday, July 9, 2013 2:10:29 PM America/New_York

Port forwarding is a process in which any intermediary device, typically a firewall and/or a router, that connects the internal network to the external network receives the incoming requests from the untrusted network, typically the Internet, and forwards the requests to the corresponding internal server computers, that have been assigned with the private IP addresses according to the internal network addressing scheme. Read More

Understanding NetFlow/IPFIX

Sunday, June 30, 2013 2:29:01 PM America/New_York

NetFlow is a protocol which is developed by Cisco and is used to collect network traffic for monitoring and analyzing purposes. Initially NetFlow was supported only by Cisco products. However now it has become a company standard protocol and is compatible with various other platforms as well. Read More

How Stateful Packet Inspection (SPI) Works in Firewalls?

Monday, June 24, 2013 6:44:21 PM America/New_York

Stateful Packet Inspection or SPI, which is sometimes also referred to as Dynamic Packet Inspection, is the process in which incoming and outgoing packets are deep inspected dynamically for their authenticity. Stateful Packet Inspection is mostly performed by the layer 3 devices such as firewalls or routers. When a firewall is configured for Stateful Packet Inspection, it monitors the network connections, records the current status of a packet as it leaves the interface, and tracks it until the packet reaches to its correct destination host. Read More

Understanding Dynamic Bandwidth Management

Monday, June 17, 2013 2:21:06 PM America/New_York

Dynamic Bandwidth Management is a feature in some latest security appliances and allows the administrators to efficiently manage or shape up the entire Internet traffic when a single ISP link is shared among multiple users in an organization.With the help of Dynamic Bandwidth Management utility, administrators can manage the overall utilization of the Internet connection by limiting the excessive consumption of the bandwidth by any web application. Read More

How Port Aggregation Works in Firewalls?

Sunday, June 9, 2013 8:34:35 AM America/New_York

Port aggregation is a process in which multiple ports of a network device, such as a firewall, a LAN switch or a server are combined together to work as a single LAN port. The benefit of configuring port aggregation on a network device is that the device can support increased throughput while handling heavy network traffic. Read More

Subscribe to Our Blog

   Subscribe to RSS   Subscribe to Facebook   Follow on Twitter   Follow on YouTube

Join The Other SonicWALL Readers Just Like You.