18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

C HAPTER 1<br />

Introduction<br />

About this chapter This chapter briefly describes the security that the <strong>Sidewinder</strong> <strong>G2</strong><br />

Security Appliance adds to your network, and introduces the<br />

administration options available to you. It also provides information<br />

on how your <strong>Sidewinder</strong> <strong>G2</strong> operating system differs from a standard<br />

UNIX ® system.<br />

What is the<br />

<strong>Sidewinder</strong> <strong>G2</strong><br />

Security<br />

Appliance?<br />

This chapter includes the following topics:<br />

“What is the <strong>Sidewinder</strong> <strong>G2</strong> Security Appliance?” on page 1-1<br />

“<strong>Sidewinder</strong> <strong>G2</strong> management options” on page 1-3<br />

“The Type Enforced environment” on page 1-4<br />

“Additional <strong>Sidewinder</strong> <strong>G2</strong> operating characteristics” on page 1-9<br />

The <strong>Sidewinder</strong> <strong>G2</strong> Security Appliance is a network security gateway<br />

that allows you to connect your organization to the Internet while<br />

protecting your network from unauthorized users and network<br />

attackers. It includes an application-layer firewall, as well as IPSec<br />

VPN capabilities and clientless VPN access, anti-spam and anti-virus<br />

filtering engines, and SSL decryption.<br />

The <strong>Sidewinder</strong> <strong>G2</strong> provides a high level <strong>of</strong> security by using<br />

SecureOS ® , an enhanced UNIX operating system that employs Secure<br />

Computing’s patented Type Enforcement ® security technology.<br />

SecureOS removes the inherent security risks <strong>of</strong>ten found in a<br />

network application running on commercial operating systems,<br />

resulting in superior network security.<br />

1<br />

Introduction 1-1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!