Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is firewall?How it differs from ACLS?

Answer Posted / devroy

An ACL is a basic level of stateless packet filtering. If
that meets your (low) security requirements, then that's
fine.

A firewall generally includes stateful packet inspection.
This will provide a higher level of security than an ACL.

That said, you need to look at the specific
implementations, as what one vendor calls an ACL another
may call a firewall.
Look at
http://www.eetasia.com/ARTICLES/2002APR/2002APR08_ICD_NTEK_R
FD_CT_MSD_TAC.PDF

Is This Answer Correct ?    1 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What Equipment Do I Need for My VSAT Network?

1154


Discuss Shannon’s capacity. What implications does it have ?

1783


what are the two sub layers of data link layer called ?

2111


When you look at a Cisco switch like Cisco 2950, why are the ports labeled with an 'X' behind the number? Like 1x, 2x.....23x, 24x, and what does it mean when there is no 'X'?

1943


Draw the IP datagram header format. “IP datagram has a checksum field still it is called an unreliable protocol”. Justify?

2570


Which device is needed to connect two LANs with different network Ids ?

1698


Explain Any Standalnoe Application with rispect to OSI model, letus Consider Voice Recognition....!! One Has To tell function of all layers with rispect to given Application.

2337


How do cryptography-based keys ensure the validity of data transferred across the network?

6646


Convert the IP address 197.228.17.56 into binary ?

4049


What is virtual channel

1104


which is the latest version of dos? & what is the command to copy windows files (i386) without formatting OS?

2098


Compare the maximum window size in go-back-N and selective-repeat ARQs.

2267


What is source route

1235


What is pool in networking?

1088


Give the equivalent binary word for the polynomial x8+x2+x+1.

1682