1. Firewall Architecture Type:
A screened-host firewall is the layout that was selected for the firewall. A bastion host is located in the back of a screening router on a screened subnet on this configuration. Serving as a secure access point between the inner community and the outdoor international is the bastion host. The bastion host acts as a proxy server for external resources and is the handiest host with whom other servers on the network might also talk (Ivanova & Jurczyk, 2003).
2. Security and Protection:
The screened-host firewall employs more than one approach to ensure safety and safety.
Centralized Control: The bastion host enables centralized manipulation and tracking of network
traffic by performing as a choke factor for all site visitors entering and exiting the network.
Traffic Filtering: Using pre-established regulations and settings, the bastion host is set up to both allow or reject traffic. This makes it viable to have unique manipulation over the forms of site visitors which can be allowed, which improves security by decreasing possible factors of assault.
3. Monitoring and Logging: All network activity can be recorded with the aid of the bastion host, giving upward thrust to an audit trail of all traffic that passes via it. It is possible to discover and respond to viable security risks in real time with the aid of keeping an eye fixed on uncommon activity (Awati, 2022).