merkow ppt 12-JRM
merkow ppt 12-JRM merkow ppt 12-JRM
Firewalls cont. � Application-Level Gateway Firewall � Allows the network administrator to implement stricter security policies than packet-filtering routers can manage � Requires special-purpose code (a proxy service) for each desired application � The proxy code can be configured to support only acceptable features of an application � Users are permitted access to the proxy services, but may not log in to the application-level gateway itself © Pearson Education Information Security: Principles and Practices 20
Firewalls cont. � Bastion Hosts � An application-level gateway is often referred to as a bastion host because it is a designated system that is specifically armored and protected against attacks � Application-level gateways allow information to flow between systems but do not allow the direct exchange of data © Pearson Education Information Security: Principles and Practices 21
- Page 1 and 2: Information Security Principles and
- Page 3 and 4: Network Security in Context � Con
- Page 5 and 6: OSI Reference Model cont. © Pearso
- Page 7 and 8: OSI Reference Model and TCP/IP cont
- Page 9 and 10: OSI Reference Model and TCP/IP cont
- Page 11 and 12: OSI Model and Security � Security
- Page 13 and 14: Data Network Types cont. � Intern
- Page 15 and 16: Basic Security Infrastructures cont
- Page 17 and 18: Basic Security Infrastructures cont
- Page 19: Firewalls � Firewalls typically r
- Page 23 and 24: Firewalls cont. � Limitations of
- Page 25 and 26: Application-Level Gateway Firewall
- Page 27 and 28: Screened Host Firewall System (Sing
- Page 29 and 30: Screened-Subnet Firewall System ©
- Page 31 and 32: Intrusion Detection Systems (IDS) -
- Page 33 and 34: Intrusion Detection Systems (IDS) c
- Page 35 and 36: Virtual Private Networks (VPNs) �
- Page 37 and 38: Virtual Private Networks (VPNs) con
- Page 39 and 40: Virtual Private Networks (VPNs) con
- Page 41: Summary � The Telecommunications,
Firewalls cont.<br />
� Bastion Hosts<br />
� An application-level gateway is often referred to<br />
as a bastion host because it is a designated<br />
system that is specifically armored and protected<br />
against attacks<br />
� Application-level gateways allow information to<br />
flow between systems but do not allow the direct<br />
exchange of data<br />
© Pearson Education Information Security:<br />
Principles and Practices 21