Firewall architectures-screening router, Computer Networking

Screening Router


In this setup network router acts as a firewall. It checks all incoming and outgoing packets according to the predefined rules. This filter is placed at the connecting point to the external network. Clients on local network and on the Internet are allowed to communicate directly but their communication is restricted to the type allowed by the router. As router is needed for connecting to the Internet so this firewall is almost free .


 Advantages


•    Cheapest, simple and transparent
•    Router could be replaced with some intelligent system to provide better access control


 Disadvantages


•    Requires complex filtering rules and hence error-prone
•    Fine grained access control is near impossible
•    Cannot add authentication system
•    If router is compromised somehow then security is at risk

Posted Date: 9/13/2012 5:44:48 AM | Location : United States







Related Discussions:- Firewall architectures-screening router, Assignment Help, Ask Question on Firewall architectures-screening router, Get Answer, Expert's Help, Firewall architectures-screening router Discussions

Write discussion on Firewall architectures-screening router
Your posts are moderated
Related Questions

Question 1 List 10 common ActiveX controls Question 2 Discuss Network Interface using any OS Question 3 Explain BGP components and its working Question 4 G

What are the Unix-based firewalls The Unix-based firewalls are considered most secured as compared to the Windows NT based ones. The firewalls bind the holes of the operating

Question: a) In relation to network design, give two reasons why the building-block approach is favoured to the traditional approach. b) Explain the following steps in rela

Question 1 Discuss the following Switching Mechanisms- Circuit switching Message switching Packet switching   Question 2 Discuss the following IEEE standard

Internet Client Control Task A distributed system is to be implemented using networked PCs. The role of the system in this task is to implement an environmental control sys

Question 1 Explain FDM and TDM with example Question 2 Define B-ISDN and explain its services Question 3 What is symmetric key cryptography? Describe one symmetric

What are the benefits of Intranet applications The benefits of successful Intranet applications can be enumerated as follows: Cheaper: Use of client browsers with one

Q. Network performance measured by delay and throughput ? delay versus load Delay is composed of? Throughput v/s network load

Recalling two FEC schemes for internet phone described. Suppose the first scheme generates a redundant chunk for every four original chunks. Suppose the second scheme uses a low-ra