How Corporate Firewalls Work
●   What's the firewall
●   What's the packet
●   Work of bastion host
●   Screening router
What's the firewall
●   It is software to have
    aimed to control the
    communication with
    the outside, and to
   ...
What's the packet
●   The one that big information
    was divided into small data.
●   The telecommunication line
    can...
Work of Bastion host
●   Computer that can
    access it by
    exceeding fire wall
    only strongly
    protected. The
 ...
Screening router
●   A screening router
    performs packet-
    filtering and is used as
    a firewall. In some
    case...
References
●   http://www.atmarkit.co.jp/aig/02security/firewall.gif
●   http://www.atmarkit.co.jp/fwin2k/network/tcpip001...
Upcoming SlideShare
Loading in …5
×

Week14.GroupB

312 views

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
312
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Week14.GroupB

  1. 1. How Corporate Firewalls Work ● What's the firewall ● What's the packet ● Work of bastion host ● Screening router
  2. 2. What's the firewall ● It is software to have aimed to control the communication with the outside, and to maintain safety. It is likely to be taken into hardware.
  3. 3. What's the packet ● The one that big information was divided into small data. ● The telecommunication line can be efficiently used. Moreover, there is ● an advantage that it is possible to substitute it with other lines ● even if the trouble goes out partially because the route selection can ● be flexibly done, too.
  4. 4. Work of Bastion host ● Computer that can access it by exceeding fire wall only strongly protected. The protocol and service are relaid, and forwarded.
  5. 5. Screening router ● A screening router performs packet- filtering and is used as a firewall. In some cases a screening router may used as perimeter protection for the internal network or as the entire firewall solution.
  6. 6. References ● http://www.atmarkit.co.jp/aig/02security/firewall.gif ● http://www.atmarkit.co.jp/fwin2k/network/tcpip001/fig ● http://www.bluechaos.be/blogs/media/blogs/DDD/Ba ● http://content.answers.com/main/content/img/CDE/S

×