Email Alerts
-
Network auditing tools for war driving: Video and quiz
Test your knowledge of network auditing tools by viewing this video and taking the quiz that follows. Know how to best tackle network access points and get a chance to be rewarded. Quiz
-
Managed intrusion prevention services handle sophisticated attacks
Adopting managed intrusion prevention services can help avert increasingly sophisticated network attacks. Feature
-
Can your security strategy handle networked facilities management?
Linking building and power management systems to converged Ethernet networks brings new security concerns. Tip
-
Data center network testing solutions: New channel opps emerge
Channel partners have long offered enterprise network testing as a service, but now data center network testing offers even more possibilities for a wider portfolio. Feature
-
NSEL NetFlow collectors gather telemetry from firewalls
As more firewalls support the NetFlow Security Event Logging (NSEL), NetFlow collectors will become a strong alternative to firewall log analyzers. News
-
Cisco ASA firewall advice: Using ASA 8.4 for stateful failover in DRP
In his series offering Cisco ASA firewall advice, Fast Packet blogger Brandon Carroll explains the new Cisco ASA 8.4 feature, Stateful Failover with Dynamic Routing Protocols. Fast Packet
-
Cisco ASA and BGP peering problems: Command line tips
If you run into BGP peering problems because of a Cisco ASA or PIX firewallin the middle, there are a few simple command line fixes that will quickly solve the problem. Fast Packet blogger Brandon Carroll explains. Fast Packet
-
Creating a firewall policy fault model with automatic correction
Firewall policy problems may be at the heart of firewalls that mistakenly block legitimate traffic or allow in troubled traffic. At LISA 2010, researchers propose creating a firewall policy fault model that can be used to implement automated correcti... Research Report
-
Application-layer firewalls defend against attacks up the stack
Application-layer firewalls must be combined with lower-level network security firewalls in order to implement a network firewall strategy that defends against low-level attacks as well as application-aware attacks. Tip
Network Management Strategies for the CIO