Internet Security

Skip to Main Content »

Have a Question? We Can Help!
Call Toll-Free 1-866-403-5305

Welcome to

You're currently on:

How IPsec VPN Site-to-Site Tunnels Work?

Monday, May 27, 2013 8:23:50 PM America/New_York

In order to understand how IPsec VPN site-to-site tunnels work, it is important to fully understand what each term individually means, and what part does each of the mentioned object play in a complete IPsec VPN site-to-site network setup. This Article will help you to understand how the network communication takes place using the secure VPN tunnel.

Read More

How Intrusion Detection Systems (IDS) Works on Firewall?

Tuesday, May 7, 2013 10:39:16 PM America/New_York

An Intrusion Detection System or IDS is a security solution which, when deployed in a network, monitors the network traffic for malicious and suspicious activities, and alerts the security administrators by triggering the alarm. There is a misconception that an Intrusion Detection System is a firewall. Although both IDS and firewall are network security appliances, they differ in their functionality and the approach they take to monitor the network traffic. Read More launches!!

Friday, March 1, 2013 10:24:29 PM America/New_York, the premier website from the DTTStores proudly announces the launch of its newest website has partnered up with Coyote Point Systems to provide load balancing solutions to suit business requirements. offers wide range of load balancing solutions, right from basic server load balancing to the top-of-the-line hardware-based SSL offloading and HTTP Gzip compression. Read More

Crystal Clear VoIP Using SonicWALL Bandwidth Management

Tuesday, October 2, 2012 3:17:18 AM America/New_York

Tired of your VoIP phone calls sounding like a low-end computer generated voice? You can solve this problem by implementing bandwidth management within your SonicWALL firewall. In this example we show you how you should properly setup your SonicWALL to maximize the throughput on a Packet 8x8 VoIP phone. Read More

Free Webinar: 2-Factor Authentication Solution for SonicWALL Firewall & SSL VPN

Monday, October 1, 2012 5:02:09 PM America/New_York

A typical user has over 30 web accounts but only 4 passwords. That means that a user shares the same password with over 7 sites. This means that even if some OTHER website is hacked, your organizations users, information security and intellectual property is at stake. Join us, to learn more about two-factor authentication in an informative webinar on Oct 11, 2012.

Read More

Best Practice: Add Comments to Firewall Policies

Monday, July 30, 2012 8:13:44 AM America/New_York

When creating a firewall policy it's always good to add a comment to it. Over the time, it's easier to review and manage firewall policies which have comments attached. Comments attached to firewall policies simplify the firewall administrator's job and help keeping a clean and secure firewall configuration. Read More

Never Use "Any" in a Firewall Rule

Thursday, July 26, 2012 1:33:29 PM America/New_York

firewall rulesIn some cases firewall administrators feel tempted to use “any” within an allow firewall rule, either because something isn’t working or to simplify their job. In this article we will see why you should never use “any” within allow firewall rules in order to prevent both security and traffic flow control issues; make sure your rules allow only needed traffic. Read More

Best Practice: Scheduling Firewall Policies

Tuesday, July 24, 2012 8:20:00 AM America/New_York

Firewall policy schedulingWhenever you have to implement a new firewall policy or you need to change a current firewall policy, an important step in the process of implementing the firewall change is to schedule an appropriate time for configuring the firewall and committing the change. Read More

Why You Should Document Firewall Policy Changes

Thursday, July 19, 2012 1:27:36 PM America/New_York

At a glance implementing a firewall change may appear a simple task, but in reality it may not be so. Common firewall changes include: adding, removing or modifying firewall rules and objects. Firewall rules and objects can change as a response to new threats, network modifications or the use of new services. Read More

UTM: Throughput and Performance Best Practices Guide

Friday, June 29, 2012 2:26:41 PM America/New_York

UTM firewall buyers guideThis article gives a list of possible reasons causing throughput and performance issues in the SonicWALL UTM appliance. The list is not complete but only an enumeration of some of the common possible solutions. Each SonicWALL UTM appliance series has different performance capabilities depending upon hardware specifications such as the CPU, the RAM or the Flash memory. It is recommended to check the particular device's capabilities before deciding that the performance related issues with the device is due to other factors. Read More

Subscribe to Our Blog

   Subscribe to RSS   Subscribe to Facebook   Follow on Twitter   Follow on YouTube

Join The Other SonicWALL Readers Just Like You.