Firewall architectures-screening router, Computer Networking

Screening Router


In this setup network router acts as a firewall. It checks all incoming and outgoing packets according to the predefined rules. This filter is placed at the connecting point to the external network. Clients on local network and on the Internet are allowed to communicate directly but their communication is restricted to the type allowed by the router. As router is needed for connecting to the Internet so this firewall is almost free .


 Advantages


•    Cheapest, simple and transparent
•    Router could be replaced with some intelligent system to provide better access control


 Disadvantages


•    Requires complex filtering rules and hence error-prone
•    Fine grained access control is near impossible
•    Cannot add authentication system
•    If router is compromised somehow then security is at risk

Posted Date: 9/13/2012 5:44:48 AM | Location : United States







Related Discussions:- Firewall architectures-screening router, Assignment Help, Ask Question on Firewall architectures-screening router, Get Answer, Expert's Help, Firewall architectures-screening router Discussions

Write discussion on Firewall architectures-screening router
Your posts are moderated
Related Questions
A method used to standardize and categorize fault-tolerant disk systems. RAID levels give lot of mixes of performance, reliability, and cost. Some servers give three of the RAID le

Explain about the Gopher The ghoper is a protocol designed to search, retrieve and display documents from remote sites on the  Internet. The Ghoper was formed as a piece of sof

Q. What do you understand by Protocol? Ans:  In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers interchange infor

Question 1 Explain the following with respect to Data Encoding                     Digital Signaling of Digital Data                     Digital Signal Encoding Techniques Questi

QUESTION (a) In CSS, each element in a document is considered to be in an invisible box. Give three ways how to make the box visible (b) (i) Explain the meaning and use of t


UDP sends packets 'blind' down the network, and relies on upper-layer protocols to form connections and identify errors. TCP is a connection-oriented protocol that can give reliabl

DISTANCE-VECTOR ROUTING: It is easy to implement. Packet switch modifies its own routing table first. It is used in RIP. LINK-STATE ALGORITHM: It is ve

Encryption Authentication One common  technique  used to encrypt and authenticate in VPNs is IP security. IP sec  is a collection of protocols designed by the IETF( Internet En

QUESTION (a) Define what is a software agent? (b) An intelligent agent is known to exhibit several characteristics or properties that distinguish it from another piece of so