Firewall For Dummies
Firewall For Dummies
Firewall For Dummies
g Easier!
Making Everythin l Edition
SonicWALL Specia
Control, manage, and protect your
Open the book and find:
network easily and automatically!
It can be a real challenge for IT administrators to
maximize the business value of web applications
while minimizing the risk. Today’s firewalls make
the job easy with granular control and real-time
visualization of applications to guarantee bandwidth
prioritization and ensure maximum network security
and productivity. This turns the traditional gateway
firewall into something much more important: a
• How today’s threat
landscape has changed
Peter H. Gregory,
CISA, CISSP, CRISC,
ISBN: 978-1-118-06194-7
Not for resale DRCE, CCSK
About SonicWALL
SonicWALL®, Inc. provides intelligent network security and data protection
solutions that enable customers and partners — around the world — to
dynamically secure, control, and scale their global networks. Built on a shared
network of millions of global touch points, SonicWALL Dynamic Security
begins by leveraging the SonicWALL Global Response Intelligent Defense
(GRID) Network and the SonicWALL Threat Center that provide continuous
communication, feedback, and analysis regarding the nature and changing
behavior of threats worldwide.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Firewalls
FOR
DUMmIES
‰
by Peter H. Gregory,
CISA, CISSP, CRISC,
DRCE, CCSK
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Firewalls For Dummies®, SonicWALL Special Edition
Published by
John Wiley & Sons, Inc.
111 River Street
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2011 by John Wiley & Sons, Inc.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise,
except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the
prior written permission of the Publisher. Requests to the Publisher for permission should be
addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ
07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, the Wiley logo, For Dummies, the Dummies Man logo, A Reference for the Rest
of Us!, The Dummies Way, Dummies.com, Making Everything Easier, and related trade dress are
trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United
States and other countries, and may not be used without written permission. All other trademarks
are the property of their respective owners. John Wiley & Sons, Inc., is not associated with any
product or vendor mentioned in this book.
For general information on our other products and services, please contact our Business Development
Department in the U.S. at 317-572-3205. For details on how to create a custom For Dummies book for
your business or organization, contact info@dummies.biz. For information about licensing the
For Dummies brand for products or services, contact BrandedRights&Licenses@Wiley.com.
ISBN: 978-1-118-06194-7
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
How This Book Is Organized................................................................... 1
Icons Used in This Book.......................................................................... 2
Where to Go from Here........................................................................... 2
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Publisher’s Acknowledgments
We’re proud of this book and of the people who worked on it. For details on how to
create a custom For Dummies book for your business or organization, contact info@
dummies.biz. For details on licensing the For Dummies brand for products or services,
contact BrandedRights&Licenses@Wiley.com.
Some of the people who helped bring this book to market include the following:
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
W ith this book, you get “must have” information about
next-generation firewalls to understand how they
work and the threats they counter. If your organization has
networks connected to the Internet, you need the information
in this book if you want to protect your network from threats
that continue to grow in their power and impact.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
2 Firewalls For Dummies, SonicWALL Special Edition
If you see a Tip icon, pay attention — you’re about to find out
how to save some aggravation and time.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 1
Understanding the
Threat Landscape
The Internet is the global marketplace of businesses, schools,
and governments, the prime medium for personal and busi-
ness communication, and the meeting place for personal and
business networking. Practically everything that happens in
the world happens on the Internet, or the Internet is used to
communicate these events to others.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
4 Firewalls For Dummies, SonicWALL Special Edition
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 1: Understanding Threats and the Role of Firewalls 5
While you may find many sexier and more valuable exploits
today, the tools that intruders use to discover and exploit
vulnerabilities still include all the basic operating system-level
weaknesses. This is like saying an intruder who may try to
find ways to break into your home with advanced lock picks
still checks under the doormat for the key.
Turn it off
✓
Block vulnerable systems and ports with a firewall
✓
Patch or configure to make safe
✓
Pray for the best
✓
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
6 Firewalls For Dummies, SonicWALL Special Edition
This problem was big for website operators, and for a time,
no easy solution existed. Website operators had to become
skilled at being able to block all kinds of malicious content
that firewalls (and antivirus) weren’t designed to inspect
and block.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 1: Understanding Threats and the Role of Firewalls 7
More critical services exposed
As the 1990s have given way to the 2000s, organizations put
up other critical services on their networks, and in many
cases they have made these services available to the Internet.
These services include the following:
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
8 Firewalls For Dummies, SonicWALL Special Edition
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 1: Understanding Threats and the Role of Firewalls 9
Over time, firewalls were also improved to make administra-
tion easier (generally through graphical interfaces instead of
command lines), and logging was improved so that adminis-
trators could monitor activities on the firewall such as failed
and successful communication through the firewall.
Firewall technologies
Firewalls use several techniques to protect networks and sys-
tems. This section describes those techniques, in roughly the
order that they have been developed over the years.
Proxy firewalls
A proxy is a server or device that acts as a gateway between
two systems or networks. A firewall that acts as a proxy fil-
ters packets like a packet filter firewall, but it also performs
another role: A proxy server sits in the middle of a connection
between two servers and acts as a two-way intermediary.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
10 Firewalls For Dummies, SonicWALL Special Edition
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 1: Understanding Threats and the Role of Firewalls 11
Deep packet inspection firewalls
The next big jump in firewall technology is known as the deep
packet inspection firewall, so named because this type of fire-
wall examines more than just the packet’s header (source and
destination IP addresses and ports), but also examines the
contents of data being transferred through the firewall.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
12 Firewalls For Dummies, SonicWALL Special Edition
Current firewalls
Firewalls available today are far more advanced than at any
time in the past. Two types of modern firewalls are:
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 2
Examining Features
in Today’s Firewalls
In This Chapter
▶ Understanding access control lists and why they’re still important
▶ Knowing why firewalls decrypt and re-encrypt SSL traffic
▶ Seeing why logging is so important on today’s firewalls
Access Rules
The access control lists (ACLs) found in the earliest firewalls
are present in modern firewalls. It is still important to block and
permit network traffic to and from specific IP addresses, net-
works, and ports. The foundation of a firewall that’s effectively
protecting the organization starts with a well-built set of rules.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
14 Firewalls For Dummies, SonicWALL Special Edition
IDSs have given way to IPSs. An IPS has all the features of an
IDS but can also block suspected attacks instead of merely
reporting them. IPSs work by examining the details of each
packet on the network, and then blocking the packet or
permitting it to proceed based on evaluation results.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 2: Examining Features in Today’s Firewalls 15
block network traffic that should be allowed to pass through
the network and therefore avoid embarrassing outages.
Reassembly-Free Deep
Packet Inspection
Today’s firewalls are packing in a lot of features into a single
product. However, all these features can result in increased
time for packets to get through the firewall because of all of
the examination by IPS, antivirus, antispam, ACLs, and so on.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
16 Firewalls For Dummies, SonicWALL Special Edition
Antispam
Spam makes up 80 to 90 percent of all e-mail passing through
the Internet. Besides being annoying, much of this spam con-
tains malware in attached files or links to websites with mal-
ware that tries to install itself on victim computers. You can
block spam on the
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 2: Examining Features in Today’s Firewalls 17
provider, who filters out spam. While this process
reduces network bandwidth, there’s added risk because
the spam service provider is now on the critical path for
incoming e-mail, and the organization loses some control.
Antispam appliance: This type of solution is becoming
✓
popular, because it removes spam before it reaches the
corporate e-mail server. This dramatically reduces the
volume of work that the e-mail server has to process.
Next-generation/UTM firewall: Moving antispam to
✓
a firewall is another logical step in consolidating IT
investment and improving performance. This type of
firewall is already performing deep packet inspection,
so why not let it perform your spam blocking?
While each of these methods has its pros and cons, organiza-
tions have moved to central control and blocking of spam,
preferably before it reaches and overburdens e-mail servers.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
18 Firewalls For Dummies, SonicWALL Special Edition
Application Intelligence
and Control
Leading next-generation firewalls are able to examine application-
related traffic and act on those messages on an application basis
instead of on a port number basis. A firewall that recognizes
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 2: Examining Features in Today’s Firewalls 19
traffic as being related to a specific application can make
better decisions about what to do with each packet as it flies
through the network.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 3
Uncovering Advanced
Firewall Features
In This Chapter
▶ Knowing why firewalls decrypt and re-encrypt SSL traffic
▶ Understanding the benefits of advanced application intelligence,
control, and visualization
▶ Seeing how advanced features make firewalls even more valuable
▶ Understanding advanced reporting
Deep-Packet Inspection of
Encrypted Network Traffic
Much of the sensitive traffic passing over the Internet, particu-
larly Web traffic, is end-to-end encrypted with SSL. This means
that intermediate devices like firewalls only see encrypted
packets as they pass back and forth between endpoints.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
22 Firewalls For Dummies, SonicWALL Special Edition
Next-Generation Firewall
decrypt re-
deep
Internet encrypt
packet
re-
inspection decrypt
encrypt
Web End user
Server workstation
SSL
encrypted SSL
encrypted
Not
encrypted
Application Intelligence,
Control, and Visualization
Advanced firewalls are aware of the details of traffic on the
network at the application level. These details can be dis-
played visually, giving you a better idea of what’s going on in
the network.
Application intelligence
Today’s advanced firewalls are application-aware. Not only
are these firewalls cognizant of what traffic is traversing the
firewall on what ports, but also
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 3: Uncovering Advanced Firewall Features 23
Advanced awareness gives administrators the ability to
control the traffic that traverses the firewall by application
instead of just by port number. This is important, especially
with web applications that primarily run on ports 80 (HTTP)
and 443 (HTTPS).
Application control
Advanced firewalls give administrators control over the net-
work traffic that flows through the firewall. The types of control
available on today’s advanced firewalls include the following:
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
24 Firewalls For Dummies, SonicWALL Special Edition
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 3: Uncovering Advanced Firewall Features 25
Application visualization
Today’s advanced firewalls wouldn’t be complete unless they
also included advanced means for viewing the traffic that’s
flowing through the firewall. “A picture paints a thousand
words,” as the old saying goes, and graphical representations
of firewall traffic can help administrators and management
immediately understand what’s happening on the firewall
right now or over a span of time.
Dashboards
Understanding what’s going on in a firewall starts with one
or more high-level views. Today, these views are called
“dashboards” because they include a broad array of valuable
information. A typical application visualization dashboard can
illustrate the portion of traffic used by various applications in
an organization. Another can show network utilization of vari-
ous applications over a period of time.
Detailed visualization
Understanding the traffic that’s flowing through a firewall at
the “dashboard” level is important, but often it’s necessary
to be able to “drill down” and get more detailed information
about what’s going on. Administrators and management are
likely to want to know
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
26 Firewalls For Dummies, SonicWALL Special Edition
The old saying, “If you can’t measure it, you can’t manage
it,” fits the firewall management problem quite well. Be sure
your firewall has a rich array of visual and numeric measure-
ment capabilities that will enable you to manage traffic flow
through your firewall.
Webmail
✓
File sharing sites
✓
Social networking sites
✓
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 3: Uncovering Advanced Firewall Features 27
Account numbers: Includes credit card numbers, bank
✓
account numbers, and other financial account numbers
Personal identification data: Includes social security and
✓
social insurance numbers, passport numbers, driver’s
license numbers, home addresses, and medical information
Customer related information: Includes nearly every-
✓
thing about customers, including contact information,
sales history, contracts, and customer-owned data
Company proprietary information: Includes M&A (merg-
✓
ers and acquisitions) information, company financials,
prospect lists, internal memos, and source code
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
28 Firewalls For Dummies, SonicWALL Special Edition
Regular review of these and other DLP reports will help man-
agement to better understand the effectiveness of its DLP
system and whether additional configuration changes are
needed. For instance, there may be too many alerts of certain
types, or too few of another. Also, the DLP system may be
blocking legitimate network traffic.
Management in Large
Distributed Enterprises
Managing two or three firewalls is relatively easy. Managing
dozens of firewalls in a larger organization is considerably
more difficult. The primary challenge is the enforcement of
consistency and uniformity of the configuration of multiple
firewalls. Whenever an organization has multiple servers,
routers, or firewalls, all of them should be managed the same
way and have similar (or even identical) configurations.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 3: Uncovering Advanced Firewall Features 29
Language differences: Firewall administrators in differ-
✓
ent countries may have a greater or lesser understanding
of technical documentation and company policy.
Remote office expediency: It’s a well known fact that
✓
people in remote offices will do things based on expedi-
ency as opposed to home-office personnel who’ll do
things more consistently.
Network Performance
Management and Monitoring
Advanced firewalls provide improved reporting capabilities,
showing the network resources consumed by various applica-
tions, users, and destinations. This helps management under-
stand what traffic is on the network.
Enterprise monitoring
These reporting tools can permit an enterprise monitoring
team to keep an eye on the firewalls’ perspective on network
traffic. Firewalls that have the capability of producing alarms
when traffic thresholds are reached can alert operations per-
sonnel that there may be traffic on the network that warrants
closer observation and maybe even intervention. This can
help the organization to respond to security issues such as
attacks, break-ins, or malware infections.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
30 Firewalls For Dummies, SonicWALL Special Edition
Periodic reviews
Coupled with formal management review processes, manage-
ment can periodically examine traffic patterns on the network
to get a better long-term understanding of network traffic, and
which applications and users are consuming network resources.
Advanced Reporting
Organizations with larger and more complex environments
often need more flexibility and power in their reporting. While
great on-box reporting has high value, some organizations
need to be able to combine firewall reporting data with data
from other sources. This means that advanced firewalls need
to be able to export their reporting data into other systems.
I’m talking about more than exporting data into CVS files
for import into spreadsheets. Instead, what is needed is an
interface such as IPFIX/NetFlow with Extensions that is sent
to external collectors for comprehensive long-term trending,
forensic analysis, and threat analysis.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 4
Understanding Trends
in Remote Working
Advances in technology, the proliferation of broadband
Internet connectivity, and new economic realities are increas-
ing the incentives for employees and organizations to increase
remote work. This section describes why remote working is
increasingly common in organizations.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
32 Firewalls For Dummies, SonicWALL Special Edition
Mobile devices
Mobile devices, such as smartphones and tablet computers,
are the new endpoint. Outselling laptop computers, mobile
devices have rich connectivity and processing capabilities
unknown even a few years ago.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 4: Enabling and Protecting Remote Workers 33
for remote workers, even those with only a cellular signal, to
run bandwidth-hungry applications from practically anywhere.
Physical security
A remote worker, whether working at home or at some other
off-site location such as a hotspot, isn’t protected with the
same physical security controls that are found in many office
locations, such as
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
34 Firewalls For Dummies, SonicWALL Special Edition
Network security
Remote workers are often exposed to more threats than work-
ers located in corporate offices because the remotely con-
nected worker isn’t protected by corporate security controls
and devices, such as a firewall or an IPS.
Figure 4-1 illustrates the typical VPN problem. The office con-
nected user in this figure is protected from Internet-borne
threats by the corporate firewall and other controls. The
remote user is connected directly to the Internet and isn’t
protected by any of those controls. The VPN connected user
connects directly to the internal network, bypassing controls
protecting the internal network from possible threats present
on the user’s remote computer.
Remote User
Internet
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 4: Enabling and Protecting Remote Workers 35
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
36 Firewalls For Dummies, SonicWALL Special Edition
Clean VPN
Many organizations install their VPN entry point behind the
firewall, in effect placing remotely connecting PCs and other
devices just as though they were in the office (this is consis-
tent with the purpose of VPN — to give the end-user a “just
like I’m in the office” experience). Most organizations do not
use a firewall to control network communications between
remote PCs and the internal network.
VPN Internal
Internet Entry Firewall Network
Point
Remote
user
Figure 4-2: Firewalling remote access users.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 4: Enabling and Protecting Remote Workers 37
threaten the organization’s internal network. These newer
VPN systems interrogate every device that wishes to connect
to the internal network to ensure that the remote device
Secure remote access systems like this ensure that only com-
pliant devices are permitted to connect to the network. This
dramatically reduces the likelihood that an infected endpoint
is able to spread an infection to the internal network.
Remote administration
and control
Working remotely will only be successful if there is a viable
way for the IT department to support remote workers and
their workstations. Requiring remote users to come in to the
office if they have a serious problem isn’t feasible if the remote
worker is more than a few miles away from the office — in
many companies, remote workers may be hundreds of miles
from the office, and the cost of travel may exceed even the
replacement cost of their workstation.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
38 Firewalls For Dummies, SonicWALL Special Edition
Remote access to
user workstations
Remote workers may, at times, be away from their home
office (or wherever it is they hang out) and need to access
their remote PC. SonicWALL has another tool called Virtual
Office that permits a user to be able to connect back to their
remote PC when it’s connected to a SonicWALL VPN. This
permits users to be able to access their files or even run
applications on their remotely connected PC. This solution
is more secure than any of those “go to my PC” tools.
Global management
In many IT shops today, the mantra heard in the hallways is
“scalability.” This means that small IT staffs need to be able
to manage large numbers of devices and systems using tools
to make these tasks easier, and to make those systems config-
ured and managed more consistently.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 5
Consolidated Network
Architecture
In order to adequately protect a network from today’s threats,
an organization would have to purchase all these devices:
Firewall
✓
Intrusion prevention system (IPS)
✓
Data leakage prevention (DLP) system
✓
Antivirus system
✓
Antispyware system
✓
Spam filter
✓
Virtual private network (VPN) system (both SSL and/
✓
or IPSec)
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
40 Firewalls For Dummies, SonicWALL Special Edition
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 5: Ten Advantages of Next-Generation Firewalls 41
On a typical piecemeal network, administrators look at log
entries on several different devices:
Firewalls
✓
Antivirus
✓
Web content filtering
✓
Intrusion prevention system
✓
Data leakage prevention system
✓
Improved Security
Defense in Depth
The real threats that organizations face today can’t be
stopped with any one type of security system. It’s not only
just network-based attacks that organizations have to worry
about, but also spam, malware, rogue websites, and eaves-
dropping that all threaten to disrupt operations or steal data.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
42 Firewalls For Dummies, SonicWALL Special Edition
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 5: Ten Advantages of Next-Generation Firewalls 43
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
44 Firewalls For Dummies, SonicWALL Special Edition
So, sure, the VPN system is easy to use and set up for end-
users. But security benefits are also available to end-users
at remote locations, including home offices, public hotspots,
hotels, airports, customer sites, and so on. The primary bene-
fits: All communications between the end-user and the central
network are encrypted, so eavesdroppers on unsecured wire-
less networks can’t intercept remote user communications.
These materials are the copyright of John Wiley & Sons, Inc. and any
dissemination, distribution, or unauthorized use is strictly prohibited.
™
g Easier!
Making Everythin l Edition
SonicWALL Specia
Control, manage, and protect your
Open the book and find:
network easily and automatically!
It can be a real challenge for IT administrators to
maximize the business value of web applications
while minimizing the risk. Today’s firewalls make
the job easy with granular control and real-time
visualization of applications to guarantee bandwidth
prioritization and ensure maximum network security
and productivity. This turns the traditional gateway
firewall into something much more important: a
• How today’s threat
landscape has changed
Peter H. Gregory,
CISA, CISSP, CRISC,
ISBN: 978-1-118-06194-7
Not for resale DRCE, CCSK