Week 7 chapter 5

.docx

School

Webster University *

*We aren’t endorsed by this school

Course

5600

Subject

Information Systems

Date

Jun 21, 2024

Type

docx

Pages

4

Uploaded by MagistrateRose25373

Week 7 Chapter 5 Assignment Title: Enhancing Network Security: Exploring Screened-Subnet Firewall Presented by: Saiteja Pathipaka Date: 05/02/2024
1. Firewall Architecture Type: A screened-host firewall is the layout that was selected for the firewall. A bastion host is located in the back of a screening router on a screened subnet on this configuration. Serving as a secure access point between the inner community and the outdoor international is the bastion host. The bastion host acts as a proxy server for external resources and is the handiest host with whom other servers on the network might also talk (Ivanova & Jurczyk, 2003). 2. Security and Protection: The screened-host firewall employs more than one approach to ensure safety and safety. Centralized Control: The bastion host enables centralized manipulation and tracking of network traffic by performing as a choke factor for all site visitors entering and exiting the network. Traffic Filtering: Using pre-established regulations and settings, the bastion host is set up to both allow or reject traffic. This makes it viable to have unique manipulation over the forms of site visitors which can be allowed, which improves security by decreasing possible factors of assault. 3. Monitoring and Logging: All network activity can be recorded with the aid of the bastion host, giving upward thrust to an audit trail of all traffic that passes via it. It is possible to discover and respond to viable security risks in real time with the aid of keeping an eye fixed on uncommon activity (Awati, 2022).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help