Kokko, 2017 - Google Patents
Next-generation firewall case studyKokko, 2017
View PDF- Document ID
- 8803887263278960419
- Author
- Kokko K
- Publication year
External Links
Snippet
The objective of this Bachelor's thesis is to research a next-generation firewall and the firewalling techniques it offered. There is also a need to create case study material for the students of South-Eastern University of Applied Sciences regarding the given firewall. The …
- 239000000463 material 0 abstract description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12003485B2 (en) | Outbound/inbound lateral traffic punting based on process risk | |
US11888816B2 (en) | Localization at scale for a cloud-based security service | |
Yu et al. | PSI: Precise Security Instrumentation for Enterprise Networks. | |
US10855656B2 (en) | Fine-grained firewall policy enforcement using session app ID and endpoint process ID correlation | |
Al-Shaboti et al. | Towards secure smart home IoT: Manufacturer and user network access control framework | |
Frahim et al. | Cisco ASA: all-in-one firewall, IPS, and VPN adaptive security appliance | |
Bansode et al. | Common vulnerabilities exposed in VPN–A survey | |
Frahim et al. | Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services | |
Arefin et al. | Enterprise network: Security enhancement and policy management using next-generation firewall (NGFW) | |
de Hoz Diego et al. | CMXsafe: A proxy layer for securing internet-of-things communications | |
US11570149B2 (en) | Feedback mechanism to enforce a security policy | |
Kokko | Next-generation firewall case study | |
Shanmugaraja et al. | Accessible methods to mitigate security attacks on ipv4 to ipv6 transitions | |
Vázquez-Ingelmo et al. | Threats behind default configurations of network devices: wired local network attacks and their countermeasures | |
Frahim et al. | Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance | |
Cameron et al. | Configuring Juniper Networks NetScreen and SSG Firewalls | |
Singh | Cisco Certified CyberOps Associate 200-201 Certification Guide | |
US20250211612A1 (en) | Enhanced internal host detection protocol | |
Cameron et al. | Juniper (r) Networks Secure Access SSL VPN Configuration Guide | |
Hausman et al. | CompTIA Security+ SY0-301 Exam Cram | |
Ozhiganova et al. | Functional model of firewall application layer protection for web-based information systems | |
Keliiaa et al. | Cyberspace modernization. An interest protocol planning advisory | |
Zhou | Comparing Dedicated and Integrated Firewall Performance | |
Bendell | Configuring SonicWALL Firewalls | |
Gont et al. | RFC 7123: Security Implications of IPv6 on IPv4 Networks |