Firewall
Jump to navigation
Jump to search
↑ https://www.gartner.com/en/documents/3891177/magic-quadrant-for-enterprise-network-firewalls
↑ https://arstechnica.com/information-technology/2016/01/et-tu-fortinet-hard-coded-password-raises-new-backdoor-eavesdropping-fears/
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Major vendor providing firewall solutions includes
- AhnLab (KR)
- Barracuda Networks
- Check Point (1993)
- Cisco: Cisco ASA
- Forcepoint
- Fortinet: Fortigate (FortiOS)
- Hillstone Networks
- Huawei
- Juniper Networks (JunOS and ScreenOS)
- New H3C Group
- Palo Alto Networks (2005)
- Sangfor (CN)
- Shopos (UK)
- Stormshield
- WatchGuard
[1].
Related Topics: Software solution vs Hardware Solutions, Stateful vs stateless inspection, ACLs, Firewall placement: Internal, External
Threats protection
- Denial of service (DoS)
Backdoors
In 2016 security researchers found a SSH backdoor in FortiOS.[2]
See also
- OS: PAN-OS, FortiOS, SonicOS, IPFire, JunOS
- DMZ, Port knocking, Bastion host, Firewall Software:
iptables
ufw
firewalld
nftables
firewall-cmd
ipfw (FreeBSD)
PF (OpenBSD)
, netsh advfirewall, PAN-OS, WAF, pfsense, VyOS, Cisco ASA, DMZ, F5, URL Filtering, port forwarding, macOS application firewall, Windows firewall, Fortigate, ngrok, Network ACL - Traffic shaping: Network bandwidth,
tc
, PacketShaper, Traffic QoS, IEEE P802.1p,Netperf
- Security: Security portfolio, Security standards, Hardening, CVE, CWE, Wireless Network Hacking, vulnerability scanner, Security risk assessment, SCA, Application Security Testing, OWASP, Data leak, NIST, SANS, MITRE, Security policy, Access Control attacks, password policy, password cracking, Password manager, MFA, OTP, UTF, Firewall, DoS, Software bugs, MITM, Certified Ethical Hacker (CEH) Contents, Security+ Malware, FIPS, DLP, Network Access Control (NAC), VAPT, SIEM, EDR, SOC, pentest, PTaaS, Clickjacking, MobSF, Janus vulnerability, Back Orifice, Backdoor, CSO, CSPM, PoLP, forensic, encryption, Keylogger, Pwn2Own, CISO, Prototype pollution
Advertising: