“Discuss the various types of firewalls. What are the pros and cons of each? Are there situations when certain firewalls should be avoided? Explain.”

 Order instructions 

1.Adm B).  There are many different types of firewalls.

A packet-filtering firewall, or stateless firewall, scan packets at the router level. This type of firewall screens packets from the outside for correct IP addresses, port assignments, and packet type, or a protocol number. A pro of this type of firewall is that it’s easy to setup. A con is this type of firewall is vulnerable to IP spoofing because it doesn’t cache the old IP addresses

The circuit-level gateway firewall only lets in packets that are requested from inside the network. Circuit-level gateways work on the session layer and monitor the TCP handshake for legitimate traffic. If the packets that try to enter the network were not requested from within the network, they are blocked and discarded. A pro is it prevents unrequested packets from entering the network. A con is that it does not inspect the packets.

Stateful inspection firewalls, or dynamic firewalls, monitor legitimate traffic across the network that is being processed over an active connection. It matches packet information to a state table; if at any time the connection goes silent, the firewall will drop it from the network. The pro for this type of firewall is it inspects the packets unlike the stateless firewall and circuit-level gateway. The con is it cannot prevent application layer attacks and is more complex to set up.

Application level gateway firewalls, or proxies, are used to filter certain types of data. According to Ferrell (2002), “They filter packets not only according to the service for which they are intended (as specified by the destination port), but also by certain other characteristics such as HTTP request string” (para. 6).  A pro is it adds an extra layer of security to the network. A Con is a possible reduction in network performance.

 

2Fgn P).TYPES OF FIREWALLS

  There are several types of firewalls, of which two main firewalls categorized is hardware firewall and software firewall. Types of software firewall is software-freeware firewalls, commercial personal firewalls, and commercial enterprise firewalls. All these are software based. And there is harware appliances firewall as well.

Hardware appliances firewall is more scalable than software firewalls, in addition to offer faster throughput. The only downfall is that it can be heavy in the pockets, meaning expensive and difficult to patch if bugs or security alert is required. (Weaver & Weaver et al. P. 311)

Out of all types of Software firewalls, freeware has the least features to offer and lacks technical support; users who perfers such firewall is due to ease of installation and it requires small file size. (Weaver & Weaver et al. P 311)

Commercial personal firewalls would be the most economical and easy to install. It has autoconfiguration feature that aides new to technology users yet provide fine tuned controls. Commercial personal firewalls are usually installed for single computer system which assists in reducing security. Commercial personal firewalls are not as featured as enterprise and not as robust as hardware firewall (Weaver & Weaver et al. P 311).Commercial enterprise firewalls could get difficult to install and configuration gets expensive. The best use of commercial enterprise firewall is to maximize security. The firewall would be able to monitor in real time as well as aide to get centralized administrator. Commercial enterprise firewall acts as an active detection in real time

Weaver & Weaver et al. P 311).

Many times setting strict rules for firewalls may cause packet capturing and running certain websites that may not be at high risk to not come through. If the user doesn’t know how to set rules for the firewall and built sturdy firewalls, it may cause more harm than benefit.

 

 

3Drk C ).  Most IT professionals think there are two or at the most, three types of firewalls. Actually, there are at least five basic types:

Packet-filtering firewalls operate at the router and compare each packet received to a set of established criteria (such as allowed IP addresses, packet type, port number, etc.) before being either dropped or forwarded (ISO Training Institute, 2017).

Circuit-level gateways monitor the TCP handshaking going on between the local and remote hosts to determine whether the session being initiated is legitimate whether the remote system is considered “trusted.” They don’t inspect the packets themselves, however (ISO Training Institute, 2017).

Stateful inspection firewalls, on the other hand, not only examine each packet, but also keep track of whether or not that packet is part of an established TCP session. This offers more security than either packet filtering or circuit monitoring alone, but exacts a greater toll on network performance (ISO Training Institute, 2017).

Application-level gateways (proxies) combine some of the attributes of packet-filtering firewalls with those of circuit-level gateways. They filter packets not only according to the service for which they are intended (as specified by the destination port), but also by certain other characteristics such as HTTP request string. While application-level gateways provide considerable data security, they can dramatically impact network performance (ISO Training Institute, 2017).

Multilayer inspection firewalls combine packet filtering with circuit monitoring, while still enabling direct connections between the local and remote hosts, which are transparent to the network. They accomplish this by relying on algorithms to recognize which service is being requested, rather than by simply providing a proxy for each protected service. Multi-layer firewalls work by retaining the status (state) assigned to a packet by each firewall component through which it passes on the way up the protocol stack. This gives the user maximum control over which packets are allowed to reach their final destination, but again affects network performance, although generally not so dramatically as proxies do (ISO Training Institute, 2017).

 

 

PLEASE READ THIS.IT IS VERY IMPORTANT

Allow your discussion posts to be detailed and capable of sharing knowledge, ideas and points.  You must discuss the topic using your own words first.  Using your own words indicate you understand the topic of discussions.  Secondly, you must cite your sources in-text.  This is necessary to justify your points. Sources from several sources showed good research abilities.  Lastly, you must provide references at the bottom of your post.  A discussion post without justification with sources does not show proper research abilities. A terse and not detailed discussions represent post that would not provide enough sharing of knowledge or proper understanding of the topic. DO NOT just copy and paste a sentence from online with citation at the end as your own discussion. I have not asked for definitions, I asked for discussions and will not buy this.  You must show understanding of the discussion topic by using your own words to describe the topic and then justify that with sources.

 

www.citationmachine.net to format references into the APA style if necessary. Extremely important. Intext citations is very essential and highly needed as well.

 

 

use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method (citation should be relevant and current). Page-length requirements:2 PAPARAGRAPHS FOR EACH PROMPT ANSWER. Make sure you cite if you take a piece of someone’s work, very important and your reference should relate to your writing (don’t cite a reference because it relates to the course and not this very paper) at least 2 current and relevant academic references. No heavy paraphrasing of others work.

For a custom paper on the above or a related topic, place your order now!

What We Offer:

• Affordable Rates – (15 – 25% Discount on all orders above $50)
• 100% Free from Plagiarism
• Masters & Ph.D. Level Writers
• Money Back Guarantee
• 100% Privacy and Confidentiality
• Unlimited Revisions at no Extra Charges
• Guaranteed High-Quality Content

WE ACCEPT