Access "Avoiding Network Traffic Confusion with Consistent Firewall Rules"
This article is part of the November 2005 issue of Comparing five of the top network-based inline IPS appliances
BITS & BOLTS Conflicting firewall rule sets can make policing your network a nightmare. Here's how to keep traffic flowing smoothly. Imagine bearing down on a busy intersection. A traffic cop is furiously waving you on, but as you approach, you notice he's also waving on traffic from the cross street with his other hand. In the ever-changing business environment, this is what security managers face every day: increasingly complex and dynamic enterprise networks, where the left hand doesn't know what the right hand is doing. Administering additional access control devices and maintaining consistent firewall rules throughout this evolving labyrinth can be a nightmare. Layered controls, multiple network entry points and tools that trigger automated changes conspire to produce conflicts and holes in your rule sets, which can impede and shut down legitimate business traffic and expose your enterprise to attack. But, if you understand how access control rule sets get confused and follow industry best practices to maintain consistency, you can keep your network ... Access >>>
Premium Content for Free.
Secure Reads: Contemporary Cryptography
Read a review of the book Contemporary Cryptography.
Application Security: Secure Software's CodeAssure Suite
Secure Software's CodeAssure Suite
Avoiding Network Traffic Confusion with Consistent Firewall Rules
Keep network traffic flowing by collaborating firewall rules and network access devices.
Content Filtering: InterScan Web Security Suite 2.5
Trend Micro's InterScan Web Security Suite 2.5
Antispyware: SurfControl's Enterprise Threat Shield 3.0
by Steven Weil, Contributor
SurfControl's Enterprise Threat Shield 3.0
ZyXEL Communication's ZyWALL P1
- Secure Reads: Contemporary Cryptography
Hot Pick: SecureWave's Sanctuary Device Control 3.0.1
SecureWave's Sanctuary Device Control 3.0.1
E-mail Security Guide for Managers
Staying on top of the latest e-mail threats.
Vulnerability tools provide a realistic view of the enterprise, where vulnerabilities are viewed in the context of the IT landscape.
Recent Releases: Security product briefs, November 2005
Learn about the security products that launched in November 2005.
On the Line
See how five IPS appliances match up against attacks.
- Hot Pick: SecureWave's Sanctuary Device Control 3.0.1
Editor's Desk: An email security guide for managers
Knights of Spamalot
Layer 8: SOX security spending is an old, wrinkled tactic
Ping: Katrina's Security Survivors
Katrina's Security Survivors
Perspectives: ITIL has application in security
The Information Technology Infrastructure Library (ITIL) is a set of best practices and guidelines for managing IT services can be applied to information security.
- Editor's Desk: An email security guide for managers
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...