Internet Security

Skip to Main Content »

Have a Question? We Can Help!
Call Toll-Free 866.403.5305

Welcome to Firewalls.com.

You're currently on:

How Intrusion Prevention Systems (IPS) Work in Firewall?

Tuesday, July 23, 2013 6:11:27 PM America/New_York

An Intrusion Prevention System (IPS) is a security solution that provides security against unauthorized access and malicious activities at the network level. Unlike Intrusion Detection System that only monitors the network traffic, an Intrusion Prevention System also ensures protection against intrusions that takes place on the network Read More
Posted in How To & Tips By Firewalls.com Tech Team

How Stateful Packet Inspection (SPI) Works in Firewalls?

Monday, June 24, 2013 6:44:21 PM America/New_York

Stateful Packet Inspection or SPI, which is sometimes also referred to as Dynamic Packet Inspection, is the process in which incoming and outgoing packets are deep inspected dynamically for their authenticity. Stateful Packet Inspection is mostly performed by the layer 3 devices such as firewalls or routers. When a firewall is configured for Stateful Packet Inspection, it monitors the network connections, records the current status of a packet as it leaves the interface, and tracks it until the packet reaches to its correct destination host. Read More
Posted in Product Information How To & Tips Documentation By Firewalls.com Tech Team

Understanding Dynamic Bandwidth Management

Monday, June 17, 2013 2:21:06 PM America/New_York

Dynamic Bandwidth Management is a feature in some latest security appliances and allows the administrators to efficiently manage or shape up the entire Internet traffic when a single ISP link is shared among multiple users in an organization.With the help of Dynamic Bandwidth Management utility, administrators can manage the overall utilization of the Internet connection by limiting the excessive consumption of the bandwidth by any web application. Read More
Posted in Product Information How To & Tips By Firewalls.com Tech Team

How Port Aggregation Works in Firewalls?

Sunday, June 9, 2013 8:34:35 AM America/New_York

Port aggregation is a process in which multiple ports of a network device, such as a firewall, a LAN switch or a server are combined together to work as a single LAN port. The benefit of configuring port aggregation on a network device is that the device can support increased throughput while handling heavy network traffic. Read More
Posted in How To & Tips Documentation Internet Security By Firewalls.com Tech Team

Best Practice: Add Comments to Firewall Policies

Monday, July 30, 2012 8:13:44 AM America/New_York

When creating a firewall policy it's always good to add a comment to it. Over the time, it's easier to review and manage firewall policies which have comments attached. Comments attached to firewall policies simplify the firewall administrator's job and help keeping a clean and secure firewall configuration. Read More
Posted in How To & Tips By Firewalls.com Tech Team

Never Use "Any" in a Firewall Rule

Thursday, July 26, 2012 1:33:29 PM America/New_York

firewall rulesIn some cases firewall administrators feel tempted to use “any” within an allow firewall rule, either because something isn’t working or to simplify their job. In this article we will see why you should never use “any” within allow firewall rules in order to prevent both security and traffic flow control issues; make sure your rules allow only needed traffic. Read More
Posted in How To & Tips By Firewalls.com Tech Team

Best Practice: Scheduling Firewall Policies

Tuesday, July 24, 2012 8:20:00 AM America/New_York

Firewall policy schedulingWhenever you have to implement a new firewall policy or you need to change a current firewall policy, an important step in the process of implementing the firewall change is to schedule an appropriate time for configuring the firewall and committing the change. Read More
Posted in How To & Tips By Firewalls.com Tech Team

Why You Should Document Firewall Policy Changes

Thursday, July 19, 2012 1:27:36 PM America/New_York

At a glance implementing a firewall change may appear a simple task, but in reality it may not be so. Common firewall changes include: adding, removing or modifying firewall rules and objects. Firewall rules and objects can change as a response to new threats, network modifications or the use of new services. Read More
Posted in Firewalls.com News How To & Tips Documentation By Firewalls.com Tech Team

UTM: Throughput and Performance Best Practices Guide

Friday, June 29, 2012 2:26:41 PM America/New_York

UTM firewall buyers guideThis article gives a list of possible reasons causing throughput and performance issues in the SonicWALL UTM appliance. The list is not complete but only an enumeration of some of the common possible solutions. Each SonicWALL UTM appliance series has different performance capabilities depending upon hardware specifications such as the CPU, the RAM or the Flash memory. It is recommended to check the particular device's capabilities before deciding that the performance related issues with the device is due to other factors. Read More

Finding Torrent Users Using SonicWALL Analyzer

Thursday, February 9, 2012 6:00:55 PM America/New_York

SonicWALL Analyzer allows you to find and document users' activities on the Internet. Learn how you can quickly identify these users to prevent them from jeopardizing your network's integrity and consuming your Internet bandwidth. Read More
Posted in How To & Tips By Support Team

Subscribe to Our Blog

   Subscribe to Firewalls.com RSS   Subscribe to Firewalls.com Facebook   Follow Firewalls.com on Twitter   Follow Firewalls.com on YouTube

Join The Other SonicWALL Readers Just Like You.