Preview

Comparison Between Different Firewall and Their Abilities.

Good Essays
Open Document
Open Document
1000 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Comparison Between Different Firewall and Their Abilities.
Packet filtering is the earliest technology developed to protect the network from dangers in the Internet. It works at network transport layer. A data is split in to several packets and then reassembled back once it has reached its destination. Administrators creates a set of rules which will then be configured to the router, router will then act as a security guard, will either deny or allow packets from passing through. However packet filtering has only limited function, it can only analyze header information in IP packets. For an instance it can all allow or deny specific functions of FTP such as the use of “GET” and “PUT” command (Ogletree, 2000). Packet filtering susceptible to IP Spoofing (Webopedia, 2011). IP Spoofing is used by unauthorized people to gain access to a network, it is a technique done by using the IP address of an authorized or trusted host to enter the network. Advantages of packet filtering Mainly increases the efficiency level by eliminating the processing of overhead by higher level firewall such as proxies. It helps implement choke point as a security strategy because packet filter is installed and monitored in a single location. It also protects network against network sweeping threats and also resolver certain spoofing attacks (Preetham, 20002). Disadvantages of packet filtering Packet filter only checks what protocol, source and destination is used but won’t check on who is trying to access the network. Besides that Trojan horses or viruses can enter into the network using HTTP tunneling (Preetham, 2002).

Proxy servers acts as middle men that connects and communicate client and server. Thus no actual IP packets go through client and server, because it separates the outside network from private network. Application level is the stage where proxy server works thus according to Ogletree (2000), proxy server is application specific and can be programmed to allow or deny access to a service based on user’s preferred function. A proxy

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1120 Lab 3

    • 115 Words
    • 1 Page

    1. It can show hackers where to attack and what the most vulnerable parts of the traffic are.…

    • 115 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Without state-based connection monitoring and filtering, web pages would not display information as users would expect. This is because firewalls filter traffic using a combination of IP and port number. Web servers usually use port 80, but web based applications. Just as internet browsers, choose a random port number to listen on when a request is initiated. Without state-based filtering when the listening port number changes, the connection would be terminated and requested information would not be received. State-based or stateful filtering most significant advantage is that this technology allows the connection to stay open and active until the connection is terminated by the applications that requested the connection (Hinnerschietz, n.d.).…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    MGT220: Midterm Exam

    • 1999 Words
    • 8 Pages

    D. Firewalls are used to protect information in transit. Question 6 2 points Remote administration Trojans (RATs) are a class of backdoors that are extremely dangerous because they enable remote control over the infected machine. Save…

    • 1999 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 5 Assignment 1

    • 1348 Words
    • 6 Pages

    4. The server accept the connection and to send the data from server to client and vice…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    a) Firewalls: Controls the traffic flow between a trusted network and an untrusted network. Usually firewalls are used to protect the boundaries of a network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Between every network and the outside host of threats there is a first line of defense. For almost every network this will be a firewall. A firewall can be both hardware and software and is usually a combination of the two. A firewall creates a barrier between networks. Any outside computer or client must pass through the firewall to access the network or its resources. Only a computer or system that has proper access can easily access a network protected by a properly configured firewall. Though it is not infallible, a firewall is the first and perhaps best means of security…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    A level of security is the IP stateful firewall a security appliance that is used to filter IP packets and block unwanted IP, TCP, and UDP packet types from entering and leaving the network.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    - All nodes attached to the administrative function segment is physically connected by CAT 6 cable and transmitting 1000 Base T.…

    • 1324 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    wk 4 lab 2

    • 403 Words
    • 1 Page

    5. IP stateful firewall is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known active connection will be allowed by the firewall; others will be rejected.…

    • 403 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    Proxy server operates at the application layer of firewall, where both ends of the connection are forced to conduct session through the proxy. They operate by creating and running a process on the firewall that mirrors a service as if it were running on the host end, and thus centralize all the information transfer to the firewall for scanning.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Packet sniffing is a type of attack in which the attacker uses the collection of network messages as it is traveling from the user to the server in order to divulge…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    A firewall restricts access to your network by filtering and blocking packets based on the sender's and receiver's Internet Protocol addresses. A proxy firewall acts as an intermediary between a client and a server, and it retrieves information and sends to the client. A proxy firewall uses stateful inspection technology to monitor incoming information and restricts network packets through the firewall. A firewall uses network address translation or NAT to assign IP addresses to each device which is connected to your network and makes it harder for hackers to break the network security.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Second, internet filters also have other advantages. First, filter software can protect the data of businesses; companies also need to protect customer information to keep it from falling in the wrong hands. Second, filter software can identify internet theft is a real threat, because hackers are skilled at getting people's personal information and using it to commit fraud. Third, filter software can make the employees more productive, because there are employees who spend many working hours surfing websites unrelated to their jobs.…

    • 486 Words
    • 2 Pages
    Good Essays