Cisco Blogs


Cisco Blog > Security

Firewall, IPS, and Web Security Without Degrading Performance? Yes You Can Have It All!

February 28, 2012 at 4:00 am PST

In an effort to reduce costs and improve operational efficiency, organizations of all sizes have begun compressing their firewall and other security services into smaller form factors and fewer physical units. Many small and midsized companies have opted for UTMs to run all of their security on a single box. Unfortunately, UTMs have failed to deliver on their promise to deliver true multi-service security. Most UTMs do one or two things really well, but add all the other services as “checkbox” items just to say they have it. Read More »

Tags: , , , , , , , , ,

Router Security: Ready for Primetime

I have a confession: I’m a technology late-adopter. On Rogers’ Innovation Adoption bell curve, I probably fall somewhere in the ‘late majority’ —  I like the tried and true.

But with a few years and many advances, I’m back on Facebook (my short experience with it left me with privacy paranoia),  and if you can believe it, I’m now an iPhone user. I appreciate not lugging around my iPod, and having a camera ready whenever I need it, but it’s not only the extra bells on the integrated device that has impressed me -- it’s the realization that I don’t have to compromise functionality to have it all.

Another technology that has made a lot of strides since its entry into the market is integrated router security. Read More »

Tags: , , , , , , , ,

Block a country with my Cisco Router or Firewall

Problem:

We are often asked by customers about how they can prevent traffic from a certain country (let’s say country X) from entering their network. The motivations for doing this could vary. Sometimes a company does not do business with all countries in the world; therefore, the company doesn’t need to be accessible from all countries. Other times it is an issue of trust and security, where an administrator may not want to allow country X to enter their infrastructure. Finally, there are cases where country X has often been incriminated with malicious activity, so an administrator may want to block country X when there is no need for the organization to interact with this country. In this document I present a methodology on how to write a tool that provides the configuration lines to block country X, using your IOS router or ASA/ASASM firewall.
Read More »

Tags: , , , , , ,

Fundamentals of High End Firewalls

November 29, 2011 at 4:25 pm PST

We had fun turning out a few new security oriented fundamentals that we always hope you enjoy.  This one firewall animation is very complimentary to a full TechWiseTV show we recently released..you can see it embedded just after the jump.  Nothing in networking is ever really an apples to apples comparison but it seems like firewall vendors are more full of hot air than anyone.   Read More »

Tags: , , , , , , , ,

Duct Tape and Chewing Gum Isn’t Enough: Cloud and Virtual Environments Require Specialized Security

October 26, 2011 at 12:12 pm PST

By now, just about everybody who works in any area of IT knows that moving multiple workloads into one physical server optimizes server usage, minimizes procurement and operational costs, and increases overall efficiency of the network. As a result, virtualization technology remains one of the hottest topics in IT today, due to its overwhelming benefits to organizations of all sizes. Read More »

Tags: , , , , , ,