• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
7 22slide
 

7 22slide

on

  • 257 views

 

Statistics

Views

Total Views
257
Views on SlideShare
257
Embed Views
0

Actions

Likes
0
Downloads
1
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    7 22slide 7 22slide Presentation Transcript

    • How Corporate Firewalls Work ● How about to firewall ● Internal Screening Router's Task ● A bastion host in the firewall. ● Computer protection
    • How about to firewall ● The personal firewall (Personal firewall) is an application to control a computer and the communication of the outside network. ● For a personal computer of the personal use, I detect the invasion ● from the outside network and communication to the outside network from ● the computer inside and am aimed at intercepting it mainly.
    • Internal Screening Router's Task ● The screening router eliminates certain packets according to the rules which are set by system administrators. ● It also blocks the packets going to suspicious Internet location. ● It is possible to the router is set up to block all packet except for email.
    • A bastion host in the firewall. ● A bastion host in the firewall is the primary point of contact for connections coming in front. ● The bastion host is a heavily protected server with many security provisions built in. ● Bastion hosts can also be set up as proxy servers.
    • Computer protection ● The bastion host is placed in a primeter network in the firewall, so it is not on the corporate network itself. This system is computer protection. ● An exterior screening router screens packets between the Internet and the perimeter network.
    • References ● http://www.cisco.com/image/gif/paws/100773/transparent-firewall.gif ● http://www.zero-one-x.co.za/images/firewall.jpg ● http://oreilly.com/catalog/fire/chapter/fire0408.gif ● http://img.zdnet.com/techDirectory/SCNROUT2.GIF