DAY 4( FIREWALL , SECURITY, DATA CENTER, FIBER OPTICS )

                     BSNL DATA CENTER ( JAYNAGAR 4th BLOCK BANGALORE)
In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed to not be secure or trusted. Firewalls are often categorized as either network firewalls or host-based firewalls. Network firewalls are a software appliance running on general purpose hardware or hardware-based firewall computer appliances that filter traffic between two or more networks. Host-based firewalls provide a layer of software on one host that controls network traffic in and out of that single machine. Firewall appliances may also offer other functionality to the internal network they protect such as acting as a DHCP or VPN server for that network.

FIRST GENERATION FIREWALL

The first type of firewall was the packet filter which looks at network addresses and ports of the packet and determines if that packet should be allowed or blocked . The first paper published on firewall technology was in 1988, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls

SECOND GENERATION FIREWALL

Second-generation firewalls perform the work of their first-generation predecessors but operate up to layer 4 (transport layer) of the OSI model. This is achieved by retaining packets until enough information is available to make a judgement about its state. Known as stateful packet inspection, it records all connections passing through it and determines whether a packet is the start of a new connection, a part of an existing connection, or not part of any connection Though static rules are still used, these rules can now contain connection state as one of their test criteria.


Reasons why you want a DMZ and the benefits it offers. The general idea is that you put your public faced servers in the "DMZ network" so that you can separate them from your private, trusted network. The use case is that because your server has a public face, it can be remotely rooted. If that happens, and a malicious party gains access to your server, he should be isolated in the DMZ network and not have direct access to the private hosts (or to a database server for example that would be inside the private network and not on the DMZ).
How to do it: There are several ways, but the 'book example' is by utilizing two firewalls (of course you can achieve the same result with one firewall and smart configuration, although hardware isolation is nicer). Your main firewall is between internet and the server and the second firewall between the server and the private network. On this second firewall, all access from the server to the private network ideally would be forbidden (of course it would be a state full firewall so if you initiate a connection from the private network to the server it would work).
So, this is a fairly high level overview of DMZ. If you want more technical details please edit your question accordingly.

Standard Features Included
The PRO 3060 running SonicOS Standard delivers value for small to mid-sized networks. 

Multi-threat Protection

* Integrated gateway anti-virus, anti-spyware and intrusion prevention support
Powerful Performance
* High-performance Architecture - Powerful Main Processor and Cryptographic Accelerator 

* 300+ Mbps Stateful Packet Inspection Firewall 
* 75 Mbps 3DES and AES VPN Throughput 
* Three Ports Enabled

Integration
* Deep Packet Inspection Firewall/IPSec VPN
Ease-of Use
* Next-Generation Streamlined GUI
Additional Optional Features
Upgrading to SonicOS Enhanced adds innovative features for more complex networks. 

Additional Threat Protection

* Real-time Blacklist Spam Filtering
Complete Business Continuity
* ISP Failover 

* WAN Redundancy and Load Balancing 
* Hardware Failover

Ultimate Flexibility
* Three additional User-Defined Ports Enabled 

* Object-based Management 
* Policy-based NAT 
* Powerful Wizards - Set-up, Firewall Policies, VPN








Previous
Next Post »