In this blog, we talk about the general idea about using and IDS or IPS. let’s recall that IDS/IPS stands for intrusion detection and prevention systems. We give examples of implementations of v...
Introduction Dans cet article nous discutons de la fonction de base d’un WAF ou pare-feu d’applications web. Comme son nom l’indique il s’agit de sécuriser l’application, plus précisemment l’acc...
In this blog let’s try to connect to a home network from outside (internet) in a secure manner using SSL. NAT and PAT NAT and PAT is what allowed local IP addresses translation or mapping to som...
In this blog, we will setup a Checkpoint lab using virtualbox and gns3 on windows. Introduction In this lab we implement a basic security architecture to demonstrate the operation of a firewall cluste...
In this blog let’s study static routing with an intermediate address to resolve in a Checkpoint firewall. Introduction Static routing is supported by CKP (Checkpoint firewalls or gateways). Let&...
In this blog, we discuss 10 security measures or controls that a LAN should have enabled. Introduction Before we present the 10 security measures to enable, let’s introduce the operation of a sw...