TITLE

Next-Gen Firewalls: What To Expect

AUTHOR(S)
Audin, Gary
PUB. DATE
June 2004
SOURCE
Business Communications Review;Jun2004, Vol. 34 Issue 6, p56
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
This article determines the significance of firewalls in computer networks. Initially, the firewall was designed as a packet-filtering device that would block unauthorized intrusions from an untrusted network like the Internet. Forwarding rules and policies determined which packets could pass through the firewall; those that did not conform to the installed policies would be blocked. The corporate firewall sits at the boundary between trusted and untrusted networks. Most firewall products are designed for data applications, not voice or video over IP. Firewalls rarely deal with specific applications, although one vendor, Ingate, designs its firewalls for the Session Initiation Protocol, which supports converged voice-video-data applications. Another type of box has entered the market, the intrusion detection system (IDS). The IDS is a passive observer that audits the policy enforcement of the firewall. Placed behind the firewall on the trusted network, the IDS's objective is to monitor traffic passing through the firewall and alert the network management when a possible intrusion has made it through the firewall. INSETS: Article Interview Resources;MIDCOM Standard.
ACCESSION #
13409152

 

Share

Read the Article

Courtesy of MICHIGAN ELIBRARY

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics