Firewall architectures-dual homed host architecture, Computer Networking

Assignment Help:

Dual Homed Host Architecture

This setup consists of a host machine with two or more IP addresses for each of its physical port. One port is connected to intranet and other to the Internet. These ports act as its two way interfaces. Data forwarding through IP address is blocked on this machine thus there is no direct communication between local network and the Internet .


The communication between local network and the Internet occurs in either of two ways:
•Local network users are given accounts on the Dual Homed Host machine. In order to access the Internet they must login on the host  machine
•Host machine runs a proxy program for each permitted service. Users can access the Internet through this proxy application. In this case login is not always required


 Advantages


•    More secure than Screening Router scheme
•    Provides better access control


 Disadvantages


•    Since packet forwarding is disabled, a proxy must exist for all services that pass through host machine
•    Not all services can have proxies and might require manual configuration or user input
•    Firewall performance is limited to the performance of the host machine
•    Only Dual Homed Host machine could be accessed from the Internet thus its security is at greater risk


Related Discussions:- Firewall architectures-dual homed host architecture

Flash-nvram-system buffer-interface buffer, Flash It is also permanent...

Flash It is also permanent storage device. It stores the compressed form of Cisco IOS software image and the NVRAM data. Device structure One flash socket Support 80

Tcp-ip routing architecture, Q. Explain TCP-IP Routing Architecture? ...

Q. Explain TCP-IP Routing Architecture? The TCP/IP routing architecture looks extremely much like the OSI routing architecture. Hosts utilize a discovery protocol to o

Packet processing on vpn router, Consider the site-to-site VPN scenario sho...

Consider the site-to-site VPN scenario shown in Figure 2. Let's deploy the AH protocol on the two VPN routers so that no desktop on the two sites need to do any AH operations. Assu

What is data traffic, Q. What is Data traffic? Data traffic ...

Q. What is Data traffic? Data traffic Peak data rate : max data rate of the traffic Average data rate = (amount of data)/time Maximum Burst size: max. l

What is point to point link, What is point to point link? It refers to ...

What is point to point link? It refers to a direct connection among two computers on a network. A point to point connection does not require any other network devices other tha

Which protocol is used for booting diskless workstations, Reverse Address R...

Reverse Address Resolution Protocol - RARP is ARP's counterpart, but it resolves IP addresses to MAC addresses typically on diskless workstations.

What rate rtcp will limit, Consider an RTP session consisting of five users...

Consider an RTP session consisting of five users, all of which are sending and receiving RTP packets into the same multicast address. Each user sends video at 200kbps. a)  What

Show the process of mail delivery, Q. Show the process of Mail Delivery? ...

Q. Show the process of Mail Delivery? Mail Delivery -Consists of three stages -First stage - email goes from user agent to local server, where it is stored until it ma

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd