Firewall architectures-screening router, Computer Networking

Screening Router


In this setup network router acts as a firewall. It checks all incoming and outgoing packets according to the predefined rules. This filter is placed at the connecting point to the external network. Clients on local network and on the Internet are allowed to communicate directly but their communication is restricted to the type allowed by the router. As router is needed for connecting to the Internet so this firewall is almost free .


 Advantages


•    Cheapest, simple and transparent
•    Router could be replaced with some intelligent system to provide better access control


 Disadvantages


•    Requires complex filtering rules and hence error-prone
•    Fine grained access control is near impossible
•    Cannot add authentication system
•    If router is compromised somehow then security is at risk

Posted Date: 9/13/2012 5:44:48 AM | Location : United States







Related Discussions:- Firewall architectures-screening router, Assignment Help, Ask Question on Firewall architectures-screening router, Get Answer, Expert's Help, Firewall architectures-screening router Discussions

Write discussion on Firewall architectures-screening router
Your posts are moderated
Related Questions

WEB TECHNOLOGY 1. Explain different protocols of internet. 2. Differentiate between DHTML and HTML. 3. What do you understand by Event-driven Programming? Classify differ

What is a protocol? The term protocol refers to a set of rules and process that govern the transmission of messages over a physical networking medium. The most common network p

The Internet protocol mentions the rules that describe the details of how computers communicate. It exactly mentions how a packet should be formed & how a router should forward eac


IPv6 packet Format The format  of an IPv6 header is shown  in figure. Although IPv6 addresses are four  times  the size  of IPv4 address  the basic  IPv6 header is only twice

Fundamentals of intranet Introduction The history of the Intranet starts right from the days when computer networks came in. However, it could find a name and place for it

Q. Flow control in TCP? The amount of data a source is able to send before receiving an ACK from the destination Whether to send 1 byte of data as well as wait for ACK

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Sending a message to a group multicast address is known as multicasting, and its routing algorithm is known as multicast routing.