Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Name firewall architectures?

Answer Posted / allu subash mohan ganesh

Single firewall
A single firewall with at least 3 network interfaces can be
used to create a network architecture containing a DMZ. The
external network is formed from the ISP to the firewall on
the first network interface, the internal network is formed
from the second network interface, and the DMZ is formed
from the third network interface. The firewall becomes a
single point of failure for the network and must be able to
handle all of the traffic going to the DMZ as well as the
internal network. The zones are usually marked with colors -
for example, purple for LAN, green for DMZ, red for
Internet (with often another color used for wireless zones).



[edit] Dual firewalls
A more secure approach is to use two firewalls to create a
DMZ. The first firewall (also called the "front-end"
firewall) must be configured to allow traffic destined to
the DMZ only. The second firewall (also called "back-end"
firewall) allows only traffic from the DMZ to the internal
network. The first firewall handles a much larger amount of
traffic than the second firewall.

Some recommend that the two firewalls be provided by two
different vendors. If an attacker manages to break through
the first firewall, it will take more time to break through
the second one if it is made by a different vendor. (This
architecture is, of course, more costly.) The practice of
using different firewalls from different vendors is
sometimes described as either "defense in depth" or (from
an opposing viewpoint) "security through obscurity".



[edit] DMZ host
Some home routers refer to a DMZ host. A home router DMZ
host is a host on the internal network that has all ports
exposed, except those ports otherwise forwarded. By
definition this is not a true DMZ (Demilitarized Zone),
since it alone does not separate the host from the internal
network. That is, the DMZ host is able to connect to hosts
on the internal network, whereas hosts within a real DMZ
are prevented from connecting with the internal network by
a firewall that separates them, unless the firewall permits
the connection. A firewall may allow this if a host on the
internal network first requests a connection to the host
within the DMZ. The DMZ host provides none of the security
advantages that a subnet provides and is often used as an
easy method of forwarding all ports to another firewall /
NAT device.

Is This Answer Correct ?    5 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is Cross Site Request Forgery and how to defend against it?

1018


What is the role of single sign on in authentication technologies?

1004


What is the difference between cybersecurity and information security?

1111


What is an arp and how does it work?

1138


What are the types fo ddos attacks?

1097


Why should you care about the OSI Reference Model

1017


What is difference between baseband and broadband transmission

1120


What is secure remote access?

1079


What is BSOD?

1006


What are the main components of the CERT Taxonomy?

3956


What is next-generation firewall (ngfw)?

1092


How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

938


How to you keep yourself updated on network security ?

1067


What is network security?

984


How does network security work?

968