User's Manual

Table Of Contents
Firebox® X Edge and Your Network
User Guide 9
needs.
Firewalls are implemented in both hardware and software, or a com-
bination of both. Firewalls are frequently used to prevent unautho-
rized Internet users from accessing private networks connected to
the Internet. All messages entering or leaving the intranet pass
through the firewall, which examines each message and blocks those
that do not meet the specified security criteria.
Firebox
®
X Edge and Your Network
The Firebox® X Edge controls all traffic between the external net-
work (the Internet) and the trusted network. The Edge also supports
an optional network to extend the protection of the firewall to
include telecommuters on a separate network. All suspicious traffic
is stopped. The rules and policies that identify the suspicious traffic
are described in Chapter 5, “Configuring Firewall Settings.”
Designed for small and remote offices with modest in-house security
expertise, the Firebox X Edge is a high-performance security device
that simply plugs in between your cable, DSL, or ISDN router and
your network.
The Web-based user interface of the Firebox X Edge intuitive and
straight-forward. You don't need additional security expertise to
install and manage your firewall. Because you can manage your net-
work securely from anywhere, at any time, you have more time and
resources to focus on your business.