logo

THE COMPARISON OF FIREWALLS

   

Added on  2022-08-22

7 Pages958 Words15 Views
Running head: - COMPARISON OF FIREWALLS
COMPARISON OF FIREWALLS
Name of the Student
Name of the University
Author Note

COMPARISON OF FIREWALLS
1
Table of Contents
1. Comparison of Firewalls:.......................................................................................................2
1.1 Packet filtering firewall:..............................................................................................2
1.2 Application-layer firewall:...............................................................................................3
1.3 Stateful-inspection firewall:.............................................................................................4
2. References:.............................................................................................................................6

COMPARISON OF FIREWALLS
2
1. Comparison of Firewalls:
Within the field of computing, Firewall refers to a system for network security that
specifically monitors as well as controls the traffic present on a network having a complete
dependency upon the security rules that have been previously determined. A firewall
explicitly creates a particular barrier in between the existing internal network along with that
of the external network, which is considered to be untrusted (Wool 2018). Such external
networks might be that of internet from where individual users gather information that might
be taken into their personal systems. Hence, the firewall might have the existence at the entry
node of the network or even within the system of the user.
There is the shared existence of primary three types of firewalls, which are,
i) Packet filtering firewall.
ii) Application-layer firewall.
iii) Stateful-inspection firewall.
1.1 Packet filtering firewall:
This particularly refers to the technique of utilizing the control network access by the
monitoring over the outgoing as well as the incoming packets along with allowing all of them
to pass or place a halt upon the source as well as the destination of the IP addresses, ports and
the protocols.
Network layer firewalls put forward the definition of filtering the rule sets, which
provision with higher efficiency within the mechanisms of security (Voronkov, Martucci and
Lindskog 2020). This particular type of firewall is also termed as static filtering.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Securing System Using IP Table Firewall
|9
|931
|74

Telecommunication And Information Security
|15
|3211
|14

CISCO Access Control List Configuration
|14
|895
|323

NEXT GENERATION FIREWALL.
|3
|422
|1

Web and Data Security: Guide to Network Defense and Countermeasures
|2
|607
|224

Network Security: Protocols, Firewalls and Hardware Security
|13
|812
|292