Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this


  1. 1. How Corporate Firewalls Work ● About Firewall ● About FTP ● About Bastion Host ● About Proxy Server
  2. 2. About Firewall ● System to prevent from it being invaded a computer network in the organization with the firewall by the outside ● In addition, the computer which such a system was incorporated in ● Of the third person invades it through outside networks such as the Internet in the networks such as companies, and data or an underlook the destruction of the program being performed watch data drifting to the border with the outside so that there is not it, and it is necessary for the detection to intercept unjust access ● A system realizing such a function is a firewall
  3. 3. About FTP ● The FTP is abbreviation of File Transfer Protocol (a file transfer protocol) and becomes "the file-transfer protocol" when I translate it into Japanese ● When it says intelligibly, it is long and sends a file into a machine in the remote place from a machine in one's very front, and it is structure far-off, to copy a file from a machine in the remote place in the reverse ● When I thought that it would make one's homepage that a general Internet user employed being aware of FTP. When I employ a modem or TA (a terminal adaptor), and a general person connected to the Internet makes one's homepage with dial-up connection
  4. 4. About Bastion Host ● A bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks ● The computer generally hosts a single application, for example a proxy server, and all other services are removed or limited to reduce the threat to the computer ● It is hardened in this manner primarily due to its location and purpose, which is either on the outside of the firewall or in the DMZ and usually involves access from untrusted networks or computers
  5. 5. About Proxy Server ● Proxy server is a server that acts as a go-between for requests from clients seeking resources from other servers ● Proxy server evaluates the request according to its filtering rules ● Proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server