Firewall architectures-screening router, Computer Networking

Screening Router


In this setup network router acts as a firewall. It checks all incoming and outgoing packets according to the predefined rules. This filter is placed at the connecting point to the external network. Clients on local network and on the Internet are allowed to communicate directly but their communication is restricted to the type allowed by the router. As router is needed for connecting to the Internet so this firewall is almost free .


 Advantages


•    Cheapest, simple and transparent
•    Router could be replaced with some intelligent system to provide better access control


 Disadvantages


•    Requires complex filtering rules and hence error-prone
•    Fine grained access control is near impossible
•    Cannot add authentication system
•    If router is compromised somehow then security is at risk

Posted Date: 9/13/2012 5:44:48 AM | Location : United States







Related Discussions:- Firewall architectures-screening router, Assignment Help, Ask Question on Firewall architectures-screening router, Get Answer, Expert's Help, Firewall architectures-screening router Discussions

Write discussion on Firewall architectures-screening router
Your posts are moderated
Related Questions
With an object server, the Client/Server application is taken as a set of communicating objects. Client object commune with server objects using an Object Request Broker (ORB). The

Bootp protocol normally use it in dhcp protocol, it is configured manually in order to give ip add or there relvent host. Rarp is a work just opposite of Arp. Rarp stand for rev

Firewalls After several  security  related internet  newsgroups  started overflowing  with posts it becomes  clear something  hand to done to help  secure  networks. The first

Q. What is Data traffic? Data traffic Peak data rate : max data rate of the traffic Average data rate = (amount of data)/time Maximum Burst size: max. l

What is ARCNet? The  Attached  Resource Computer Network (ARCNet) standard was formed in 1977 at the Data Point Corporation by a scientist  -  John Murphy. ARCNet uses the toke

RIP It is Broadcast There is no authentication It Support FLSM   RIPV2 It is Multicast There is Authentication It Support VLSM

Communication, Resource sharing and Media (When many host share their resources with every other OR when many devices connect with each other for resource sharing )

Why Does metric translation takes place in redistributing routes?

Q. Show the Flow characteristics? Flow characteristics Reliability - if lacking means that packets or ACKs are lost - more important with FTP, SMTP than with audio

QUESTION 1 (a) Draw a use-case model for the above system. You must identify all possible actors and use-cases. (b) Assume you are using the Rational Unified Process a