Lesson 6: How to Build Firewall Policies for East West Traffic
Network Segmentation: Lesson 6
Following on from Professor Wool’s previous lesson, this lesson presents a step-by-step process for writing firewall policies for East-West traffic. This involves an iterative process of discovering, identifying and then writing explicit ‘allow’ rules for all valid business traffic that goes through the network segment. Watch this video to find out more.
Learn more about AlgoSec at http://www.algosec.com and read Professor Wool's blog posts at http://blog.algosec.com
Learn more about AlgoSec at http://www.algosec.com and read Professor Wool's blog posts at http://blog.algosec.com
Видео Lesson 6: How to Build Firewall Policies for East West Traffic канала AlgoSec
Following on from Professor Wool’s previous lesson, this lesson presents a step-by-step process for writing firewall policies for East-West traffic. This involves an iterative process of discovering, identifying and then writing explicit ‘allow’ rules for all valid business traffic that goes through the network segment. Watch this video to find out more.
Learn more about AlgoSec at http://www.algosec.com and read Professor Wool's blog posts at http://blog.algosec.com
Learn more about AlgoSec at http://www.algosec.com and read Professor Wool's blog posts at http://blog.algosec.com
Видео Lesson 6: How to Build Firewall Policies for East West Traffic канала AlgoSec
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Lesson 1: How to Structure Your Security Policy in a Segmented NetworkSecuring East/West Datacenter Traffic with Palo Alto NetworksLesson 5: The Challenges of East West Traffic Discovery for Network SegmentationIntroduction to Data Loss PreventionWhat is a Firewall and How Does it Work?Taking Charge of Application SecurityStuck in Traffic - North-South and East-West TrafficWhat is a Firewall?Bandwidth vs. ThroughputDissolving Operational Security Challenges in a Hybrid Cloud EnvironmentIntrusion Detection and Prevention Systems (IDS/ IPS) | Security BasicsWatchGuard: How to setup Firewall policiesFirewall Best Practices | Security BasicsKeeping a lid on container securityHow to apply Cisco Smart License for FTD through FMCFirewall Analyzer training 2020 part 1Cloud Cybersecurity in Under 5 MinutesWhat is a firewall ?Connectivity 2022 - Network Security SummitMeasures that actually Do reduce your hacking risks