firewalls chckpoint

firewalls chckpoint - a second generation firewall, it...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Firewalls are the main defense against external threats for a computers network system. The objectives of a firewall system, is to allow network traffic to flow that has been deemed consistent with the organizations security policy. Firewalls are also there to help keep information for the organization inside the firewall. There are a few different firewall types. One type of firewall is Packet Filters ; they protect the network by using an access control list, or an ALC. The list stays on the router and tells which IP address can use the router and in what direction. Then there are Dynamic Packet Filters, which is an extension of packet filtering. It is usually referred to as stateful inspection. This firewall can monitor the state of active connections and it uses the information collected to tell which network packets are allowed through. Another Firewall type is Circuit-level Gateways , this firewall operates on the transport level of the OSI model. It is considered
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: a second generation firewall, it validates TCP and UDP sessions before it opens a connection. The circuit-level gateway can translate the IP address between the Internet and the internal systems on your network. Application level gateways are also important. They take requests from the internet service, and forward it to the actual service. Each system can talk to the gateway rather then talking to the each other directly. As for the most efficient, it really depends on where you are. Packet filtering firewalls seem to be the most basic. Each network packet reaching the firewall is evaluated based on it’s source. Where stateful inspection firewalls are really the most commonly deployed. This is because they build upon packet filters, using the firewall to maintain information about the state of each active connection....
View Full Document

This note was uploaded on 11/07/2011 for the course IT 240 242 taught by Professor Some during the Spring '10 term at University of Phoenix.

Ask a homework question - tutors are online