![]() |
| Home | Statistics | Documents | Catalog | StratEdit | XSLTForms | DNAOS | About | Portal | Glossary | Contact [!?] |
| Documents/FEATRM/23: Network Devices / Standards/Hardware / Infrastructure 3.10: Firewall |
Hardware / Infrastructure 3.10: Firewall Prevent unauthorized access to or from a private network Other Information: This refers to the network device that is designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. There are several types of firewall techniques and firewalls may implement one or more simultaneously. Packet filtering inspects inbound and outbound packets, validating against defined business rules. Application gateways apply security rules against applications. Circuit level gateways apply security rules against physical connection attempts to and from the network. Proxy servers mask the internal requestor by inspecting and augmenting the packet header. Four common architectures of firewalls include the packet filtering router, the screened host firewall system, the dual homed host firewall, and the screened subnet firewall (with a DMZ), which is one of the most secure implementations. Indicator(s):
|
| sitemap | Copyright 1971-2012 01 COMMUNICATIONS INC. ALL RIGHTS RESERVED. - Powered by DNAOS | contact |