Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Hardware
Hardware Troubleshooting
How to set up 2 DHCP servers in a single network?
Message
<blockquote data-quote="ForgottenSeer 58943" data-source="post: 706085"><p>Harbor, within 5 years or less it will be almost required to have a UTM or UTM-Like device on homes. There is a reason every manufacturer on the planet is integrating security with their upcoming firewalls. Routers are a joke. Firewalls are barely adequate. Even PfSense is considered marginal in the modern age.</p><p></p><p>Norton, F-Secure, Bullguard, Bit Defender, all of the big boys have UTM type devices. ASUS integrates with Trend. Netgear will integrate with Bit Defender. These are all basically entry level UTM's, equivalent to what we were deploying in the corporate world for SMB's a few years ago. Even TRENDnet and Tenda are working on UTM devices.. It's not marketing hype, it's a fact of life and changes that need to be made for the situation we're in. Homes are all blended OS environments with blended devices. All of them offer some level of risk that cannot be mitigated by a stupid router and you certainly can't put AV's on the vast majority of them. Therefore these UTM type devices are the logical evolution of home security.</p><p></p><p>A common question from CEO's and others in the corporate world is "Can I get one of those UTMs for my home too?". The reason is, these guys see the reports, they see the thousands of malicious blocks a week. They see the hackers being repulsed daily. Then they think 'Is my washing machine going to be a victim?'.. Well yeah, it could, or even possibly already is. A plain old cheap nat router is a joke and anyone that thinks they are adequate in the current times is really not qualified to discuss IT Security IMO. SPI?</p><p></p><p>This guy (above) says "Better routers incorporate SPI (stateful packet inspection) for even greater hardware based firewall protection.".. Are you kidding me? Stateful inspection firewalls (L2) have effectively become obsolete because of two significant limitations. First, they don't inspect the data payload of network packets. Second, they don't have the fine-grained intelligence to distinguish one kind of Web traffic from another, malicious or otherwise, or to apply policy to that traffic. Basically - Stateful Packet Inspection (SPI) firewalls that are inadequate against today's threats in whatever form those threats come in.. This isn't 1998 for god sakes, someone needs to up their game or get off the playing field.</p><p></p><p>Also, and more importantly, almost all of these devices have Botnet Shields. Basically, it's a method to prevent botnet subversion of any IoT device. Otherwise known as a 'Session Block' in the IT world. What it does is examine session creation rates and once a threshold is reached it assumes the device has been botnet compromised and arp poisons it. Very simple, very effective, and already proven in the field.</p></blockquote><p></p>
[QUOTE="ForgottenSeer 58943, post: 706085"] Harbor, within 5 years or less it will be almost required to have a UTM or UTM-Like device on homes. There is a reason every manufacturer on the planet is integrating security with their upcoming firewalls. Routers are a joke. Firewalls are barely adequate. Even PfSense is considered marginal in the modern age. Norton, F-Secure, Bullguard, Bit Defender, all of the big boys have UTM type devices. ASUS integrates with Trend. Netgear will integrate with Bit Defender. These are all basically entry level UTM's, equivalent to what we were deploying in the corporate world for SMB's a few years ago. Even TRENDnet and Tenda are working on UTM devices.. It's not marketing hype, it's a fact of life and changes that need to be made for the situation we're in. Homes are all blended OS environments with blended devices. All of them offer some level of risk that cannot be mitigated by a stupid router and you certainly can't put AV's on the vast majority of them. Therefore these UTM type devices are the logical evolution of home security. A common question from CEO's and others in the corporate world is "Can I get one of those UTMs for my home too?". The reason is, these guys see the reports, they see the thousands of malicious blocks a week. They see the hackers being repulsed daily. Then they think 'Is my washing machine going to be a victim?'.. Well yeah, it could, or even possibly already is. A plain old cheap nat router is a joke and anyone that thinks they are adequate in the current times is really not qualified to discuss IT Security IMO. SPI? This guy (above) says "Better routers incorporate SPI (stateful packet inspection) for even greater hardware based firewall protection.".. Are you kidding me? Stateful inspection firewalls (L2) have effectively become obsolete because of two significant limitations. First, they don't inspect the data payload of network packets. Second, they don't have the fine-grained intelligence to distinguish one kind of Web traffic from another, malicious or otherwise, or to apply policy to that traffic. Basically - Stateful Packet Inspection (SPI) firewalls that are inadequate against today's threats in whatever form those threats come in.. This isn't 1998 for god sakes, someone needs to up their game or get off the playing field. Also, and more importantly, almost all of these devices have Botnet Shields. Basically, it's a method to prevent botnet subversion of any IoT device. Otherwise known as a 'Session Block' in the IT world. What it does is examine session creation rates and once a threshold is reached it assumes the device has been botnet compromised and arp poisons it. Very simple, very effective, and already proven in the field. [/QUOTE]
Insert quotes…
Verification
Post reply
Top