Firewall architectures-screening router, Computer Networking

Screening Router


In this setup network router acts as a firewall. It checks all incoming and outgoing packets according to the predefined rules. This filter is placed at the connecting point to the external network. Clients on local network and on the Internet are allowed to communicate directly but their communication is restricted to the type allowed by the router. As router is needed for connecting to the Internet so this firewall is almost free .


 Advantages


•    Cheapest, simple and transparent
•    Router could be replaced with some intelligent system to provide better access control


 Disadvantages


•    Requires complex filtering rules and hence error-prone
•    Fine grained access control is near impossible
•    Cannot add authentication system
•    If router is compromised somehow then security is at risk

Posted Date: 9/13/2012 5:44:48 AM | Location : United States







Related Discussions:- Firewall architectures-screening router, Assignment Help, Ask Question on Firewall architectures-screening router, Get Answer, Expert's Help, Firewall architectures-screening router Discussions

Write discussion on Firewall architectures-screening router
Your posts are moderated
Related Questions
Question: (a) Explain the issue associated with vertices when the scan line scan line polygon fill algorithm is being applied? (b) Explain the logic of shortening edges to a

the equation x3-6x+9x-5=0

Components of the VPN When  using  VPN we incorporate many pieces of a jigsaw puzzle each piece services its own  function to private  the interoperation and the  security  nec

802.11 DSSS a) Direct sequence spread spectrum in a 2.4 GHz band b) Each bit is replaced by a sequence of bits called a chip code, implemented at the physical layer c) Se

MULTICASTING : The answer to above problem is multicasting. It is the normal form of broadcasting. It acts like broadcasting however it does not broadcast frames automatically

Error Detection-- CRC Powerful error detection system Rather than addition, binary division is utilized A series of redundant bits called "CRC" or else "CRC remai


Q. Show the TCP/IP and OSI Similarities? TCP/IP and OSI Similarities - Both have Layers - Both have Application Layers - Have Comparable Transport and Network Layer

In a network that contains two servers and twenty workstations, where is the best place to install an Anti-virus program? An anti-virus program must be installed on all servers

Simplicity The advantage of this approach is the simplicity  of receiver buffering. The  receiver need not  buffer out of  order packets the sender must maintain the upper an