What happens if the firewall is breached?
All of the services provided by the firewall run in a highly secure, decoupled environment. Even if a service is penetrated, no other functionality of the firewall can be affected and the internal network cannot be reached. Significant modifications have been made to the kernel of the firewall to remove mechanisms that can be used to get out of this isolated, cocooned environment. There is no way any code an intruder managed to download could run on the firewall. A file must have certain attributes in order to be executed; the kernel is incapable of generating these.
All of the services provided by the firewall run in highly secure, decoupled environments so that even if a service is penetrated no other functionality of the firewall can be affected and the internal network cannot be reached. Significant modifications have been made to the kernel to remove mechanisms that can be used to get out of this isolated, cocooned environment. There is no way any code an intruder managed to download could run on the firewall A file must have certain attributes in order to be executed; the kernel is incapable of generating these.