[go: up one dir, main page]

Kokko, 2017 - Google Patents

Next-generation firewall case study

Kokko, 2017

View PDF
Document ID
8803887263278960419
Author
Kokko K
Publication year

External Links

Snippet

The objective of this Bachelor's thesis is to research a next-generation firewall and the firewalling techniques it offered. There is also a need to create case study material for the students of South-Eastern University of Applied Sciences regarding the given firewall. The …
Continue reading at www.theseus.fi (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0254Stateful filtering

Similar Documents

Publication Publication Date Title
US12003485B2 (en) Outbound/inbound lateral traffic punting based on process risk
US11888816B2 (en) Localization at scale for a cloud-based security service
Yu et al. PSI: Precise Security Instrumentation for Enterprise Networks.
US10855656B2 (en) Fine-grained firewall policy enforcement using session app ID and endpoint process ID correlation
Al-Shaboti et al. Towards secure smart home IoT: Manufacturer and user network access control framework
Frahim et al. Cisco ASA: all-in-one firewall, IPS, and VPN adaptive security appliance
Bansode et al. Common vulnerabilities exposed in VPN–A survey
Frahim et al. Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services
Arefin et al. Enterprise network: Security enhancement and policy management using next-generation firewall (NGFW)
de Hoz Diego et al. CMXsafe: A proxy layer for securing internet-of-things communications
US11570149B2 (en) Feedback mechanism to enforce a security policy
Kokko Next-generation firewall case study
Shanmugaraja et al. Accessible methods to mitigate security attacks on ipv4 to ipv6 transitions
Vázquez-Ingelmo et al. Threats behind default configurations of network devices: wired local network attacks and their countermeasures
Frahim et al. Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance
Cameron et al. Configuring Juniper Networks NetScreen and SSG Firewalls
Singh Cisco Certified CyberOps Associate 200-201 Certification Guide
US20250211612A1 (en) Enhanced internal host detection protocol
Cameron et al. Juniper (r) Networks Secure Access SSL VPN Configuration Guide
Hausman et al. CompTIA Security+ SY0-301 Exam Cram
Ozhiganova et al. Functional model of firewall application layer protection for web-based information systems
Keliiaa et al. Cyberspace modernization. An interest protocol planning advisory
Zhou Comparing Dedicated and Integrated Firewall Performance
Bendell Configuring SonicWALL Firewalls
Gont et al. RFC 7123: Security Implications of IPv6 on IPv4 Networks