Firewall architectures-screened subnet architecture, Computer Network Security

Screened Subnet Architecture

This setup provides an extra security layer to screened host architecture by creating a perimeter subnet which further isolates internal network from the Internet.In this architecture two screening routers and a single screening host is used. Both routers are connected to create the perimeter subnet also called Demilitarized Zone (DMZ). Screening host sits in this subnet between two routers. One router is facing the Internet and other is facing local network. Now to break into the internal network an attacker has to pass through both the routers. Even if it breaks through screening host it still has to pass through the internal router. The DMZ could also contain all information servers, modem pools and other systems that require careful controlled access.


•    Provides maximum depth of defense
•    Local network can provide services to outside without compromising to inside
•    Much flexible than previous solutions


•    Costly as compared to other architectures
•    Much complex and requires very careful configuration between guarding machines

Posted Date: 9/13/2012 5:52:57 AM | Location : United States

Related Discussions:- Firewall architectures-screened subnet architecture, Assignment Help, Ask Question on Firewall architectures-screened subnet architecture, Get Answer, Expert's Help, Firewall architectures-screened subnet architecture Discussions

Write discussion on Firewall architectures-screened subnet architecture
Your posts are moderated
Related Questions
Encode the following plaintext, using the Caesar cipher:             LORD OF THE RINGS b) The following ciphertext              jw njbh lxmn cx kanjt has been encoded usi

Problem 1 . Show various features of a 1G network Total three features for each feature of 1G Problem 2. Describe how a cellular network works with functional block diagram

COLLISION: The receiver can get simultaneous requests, which gives in collision at receivers and both service lost and in this way no transmitter accepts reservations and both use

Advantages and Disadvantage of Packet Filtering firewall   Advantages One screening router can help protect entire network One key advantage of packet filter

LOCAL TALK Apple discovered the LAN technology that uses bus topology. Its interface is added with all Macintosh computers. It has very low speed i.e. 230.4Kbps. Also it is ch

implementing password policy in organisation

how can you enter the ASVAB practice test on line?

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t

Question 1: Why do we need a Law of Contract? a Explanation Reasons to have a law of contract b Explain the close procurement project process - Explanation (causes,

SECURITY ANALYSIS Overview •    Know yourself: examine, identify, and understand the information and systems which are currently in place •    Know the enemy: examine, identify,