Security in a Box

 
 
By Cameron Sturdevant  |  Posted 2001-12-03 Email Print this article Print
 
 
 
 
 
 
 


Security in a Box

Global Pro is a turnkey product that comes on a Sun Microsystems Inc. Netra box with the NetScreen Global Pro software already installed. The device is tamper-resistant, and all unneeded services are turned off, making it a reasonably secure platform from which to configure the firewalls and IDS (intrusion detection system) boxes in the network.

Experienced NetScreen users will have little trouble setting up the device. A professional services group at the company is available, and we recommend that new users of NetScreen products take advantage of these services to ensure that the policies created actually accomplish the desired security tasks.

The completely redesigned Java-based GUI (see screen, Page 67) makes it easy to step through the policy- creation process. The slick user interface is just that, however. Although it was easy to create policies, there is no substitute for old-fashioned, paper-and-pencil planning to figure out general security guidelines.

Global Pro made it very simple for us to make security policies and set up VPNs. Version 3.0s new ability to create groups of users and devices to which policies could be applied really helped this process.

The policy builder is really an ultra-fancy condition builder customized to match the capabilities of NetScreen security products. The policy builder covers all aspects of security operations including access filters, certificate authority locations and certificate revocation lists.

Global Pro cuts device configuration time while ensuring that the same policies are applied to all devices and users. It was no problem to assign additional policies, for example, to limit the authority of NetScreen administrators to a small group of devices, then add this policy to particular users.

We used the real-time performance module to observe the activity of NetScreen devices grouped by device type or VPN. The new performance views should make it easier for IT managers to get a sense of network usage and potential security trouble spots by highlighting unusual or bottlenecked traffic.

Senior Analyst Cameron Sturdevant is at cameron_sturdevant@ziffdavis.com.



 
 
 
 
Cameron Sturdevant Cameron Sturdevant has been with the Labs since 1997, and before that paid his IT management dues at a software publishing firm working with several Fortune 100 companies. Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility, with a focus on Android in the enterprise. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his reviews and analysis are grounded in real-world concern. Cameron is a regular speaker at Ziff-Davis Enterprise online and face-to-face events. Follow Cameron on Twitter at csturdevant, or reach him by email at csturdevant@eweek.com.
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...

 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel