Library items tagged: security

Anonymous
Overview Cisco offers the PIX firewall solution, acquired from Network Translation in 1995, along with the original Centri firewall which ran on the Windows NT® operating system. The Cisco PIX, however, runs its own proprietary system called PIX OS, currently at version 7. The PIX is a packet filtering firewall with stateful inspection, and there are several DPI features in the newer versions which enhance the rules that can be created.
Anonymous
SmoothWall and IPCop For some time, projects have been running to establish dedicated appliances based upon Linux, such as firewalls and web caches. These projects provide a pre-configured tool specific to one task which is easy to implement and configure.
Anonymous
Why use UNIX/Linux? Firstly, unless a network administrator is familiar with the UNIX/Linux platform, then it is not recommended that a UNIX/Linux firewall is implemented. It will be easier to maintain a secure system if the administrator has skills in maintaining the underlying operating system. UNIX/Linux systems typically rely on a CLI more than a GUI, making navigating the system more difficult for the first time user.
Anonymous
Good Practice All firewalls work on the premise of rules configured to implement the site security policy. Rules are so critical to the operation of the firewall that it is vital they are fully understood before a firewall implementation is deployed.
Anonymous
Design The perimeter of an organisation’s LAN is the obvious place to locate its security protection. However, the perimeter has moved: no longer is there just one ingress to a LAN, but many points of access. Wireless networks, modems, secondary Internet connections and the migration of laptops between networks mean the boundary is constantly moving.
Anonymous
Different Types of Firewall Firewalls operate in different ways, depending on the layer on which they are implemented. Circuit level firewall: data link layer Various names are used for this type of firewall. It is the type provided whenever NAT and PAT technology are used (see 3.7).
Anonymous
Matthew Cook, Loughborough University Authors and Contributors This document was put together by Loughborough University to share knowledge, experience and current trends surrounding firewall implementation with the JANET community. This Technical Guide is complemented by the JANET Training programme which provides courses covering multiple facets of firewall implementation as part of their extensive portfolio.
Anonymous
Universities or colleges consisting of multiple campuses, each with a LAN, traditionally connect geographically diverse ‘islands’ by means of private leased lines. If the connected site is small and consumes little bandwidth, the costs of such WAN links do not necessarily represent value for money. Many organisations also wish to offer their staff the facility to connect to their central network remotely, either from their houses or when travelling on business.
Anonymous
Wireless LAN Security
Anonymous
Wireless networks can be very convenient, providing Internet access at conferences, in coffee shops, motorway service stations, pubs and airports. However, some additional risks need to be considered before sending information ‘over the air’ as opposed to via fixed cables. For example: