Skip to main content

Firewall High Availability solutions technical analyze

IT systems are commonly used for performing business activities. Maintaining their continuing availability and reliability are the task IT branches are wrestling with. This is a good practice to use software of renowned vendors, brand-name devices and computer hardware, as well as purchasing technical support services. In solutions which require undisturbed operation devices equipped with redundant components (e.g. two power supply adapters, disk arrays) are used or cluster configurations composed of many devices are built.

Availability of IT system services operating in network environment depends upon many
factors (e.g. network devices, communication links, security systems). From technical point of view, the widest aspect is protection against security systems failures. It results from the complexity of their configuration as well as functions conducted. In the first place, the security system element which is subject to protection against failures is a firewall system. This is so because Firewall failure means blocking user access to the network and its resources. Configurations equipped with facilities for protection against failures are described as High Availability (HA) systems.

Comments

Popular posts from this blog

LinuxGuruz Netfilter IPTABLES Firewall Page

The Netfilter Project Homepage http://www.netfilter.org Source Code Userspace code (tar.bz2) http://www.netfilter.org/files/iptables-1.3.0.tar.bz2 FAQ Netfilter/Iptables FAQ http://netfilter.samba.org/documentation/FAQ/netfilter-faq.html Firewall Forensics (What am I seeing?) FAQ http://www.robertgraham.com/pubs/firewall-seen.html Network Intrusion Detection Systems - IDS http://www.robertgraham.com/pubs/network-intrusion-detection.html Sniffing (network wiretap, sniffer) FAQ http://www.robertgraham.com/pubs/sniffing-faq.html Linux IP Masquerade FAQ http://en.tldp.org/HOWTO/IP-Masquerade-HOWTO/ Firewall Admins Guide to Porn FAQ http://www.robertgraham.com/pubs/firewall-pr0n.html Hacking Lexicon - hacking dictionary http://www.robertgraham.com/pubs/hacking-dict.html Submit a FAQ Link or URL http://www.linuxguruz.com/iptables/#links Scripts Home LAN masquerading http://the-devil.dnsalias.net/home/extremist_MASQ Home LAN ip6t...

ESS

ESS is uniquely qualified to help you secure a new era of computing with: ·          Intelligence  – Enterprise security portfolio, with our expert field professionals, are unmatched in their ability to provide the deep analytics needed to ward off the wide range of threats ·          Integration  – Solutions and services systematically integrate both new and existing security capabilities, giving critical visibility, providing comprehensive controls, and reducing complexity ·          Expertise  – Expertise stems from our hands-on professionals and researchers whose know-how is built into our products and services, provided through real-time client feeds and embedded in our professional engagements