Advantages and disadvantage of packet filtering firewall, Computer Network Security

Advantages and Disadvantage of Packet Filtering firewall

 

Advantages

  • One screening router can help protect entire network

One key advantage of packet filtering is that a single, strategically placed filter can help protect an entire network. If there is only one router that  connects organization site to the Internet, then it provides great advantage on network security, regardless of the size of the site by doing packet filtering on that router.

 

  •  Packet filtering doesn’t require user knowledge or cooperation

Packet filtering does not require any custom software or configuration of client machines. When a packet filtering router let a packet through, the router is indistinguishable from a normal router. This transparency means that the packet filtering can be done without the cooperation and often without the knowledge of users.


 Disadvantages

  •  Current filtering tools are not perfect

 The rules of packet filtering are hard to configure and once configured, they seem hard to test. The packet filtering capabilities of many products are incomplete and the implementation of certain types of filters is almost impossible. Packet filtering packages may have bugs in them that might fail packet filtering implementation. This may allow few packets to pass into private network without proper checking.

 

  •  Some rules can’t readily be enforced by normal packet filtering routers

The information available to packet filtering router is limited. Packets have information about their host but they cannot tell about the user. So, generally no restrictions can be enforced on particular users. Restriction can be enforced on the users who could access the ports through high level protocols. These protocols ensure that no other user is accessing that port. But that kind of control can easily be subverted.

Posted Date: 9/13/2012 5:58:35 AM | Location : United States







Related Discussions:- Advantages and disadvantage of packet filtering firewall, Assignment Help, Ask Question on Advantages and disadvantage of packet filtering firewall, Get Answer, Expert's Help, Advantages and disadvantage of packet filtering firewall Discussions

Write discussion on Advantages and disadvantage of packet filtering firewall
Your posts are moderated
Related Questions
Your rules should ensure that Internet access will be restricted to the following: Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DM

The "Big Red Rocks" (BRR) mining company is based and operates in Western Australia. They are primarily an iron ore miner, but they also produce electricity through tidal power to

Describe what the FTAM services are. FTAM  stand for the File Transfer Access and Management: FTAM is an ISO application protocol which performs the operations on files such as.

Listing Assets in Order of Importance Weighting should be created for each category based on the answers to questions. The relative importance of each asset is calculated usin

Improving domain blacklisting: Current domain blacklisting techniques are not very effective as spammers keep replacing blacklisted domains with newly registered domains. Also

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

Access Controls Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control

Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats