This poster illustrates the main components in a unicast IPv6 address and some interesting facts about it.
To help design your IPv6 addressing plan, make sure you download our IP Address Calculator.
Your organization’s firewall is the first line-of-defense against cyber-attacks and it is where the implementation of the access policies takes place. In a typical organization firewall policies are constantly changing to respond to various threats and adapt to changes in the network environment. Therefore, regular audit of the firewall rules is necessary, not only to maintain the security of the network, but also to ensure the correct and optimal functioning of the firewall as policy rules continue to grow more granular and complex.
Such firewall audit should look for some common problems that result from frequent changes to firewall policies and provide recommendation on how to correct them. Among the common problems to watch for are:
The sound practice is to perform regular audits (e.g. twice a year) to clean up all redundant, unused, and disabled rules that may have been caused by removing services that are no longer exist, temporary exceptions, network upgraded, mergers and so on. It is also extremely important to find and correct shadowed rules and restrict the wide open rule rules to improve security and adhere to the organizations security policy.
Manual audit of firewall policy rules is tedious and error prone. It also adds significant load to the network administrators. Yet, the audit is necessary or even mandated for compliance purposes. To overcome these challenges, some automation of the audit process can reduce complexity and achieve significant performance improvements.
At DynamikNets, we have developed the tools to automate firewall policy audits and recommend improvements. The tools inspect firewall configurations from major vendors and identify rule anomalies and other problems. Combined with manual review of other firewall data, we are able to provide our customers with comprehensive recommendations of the changes that need to be made to the firewall rules to optimize performance.