Ask Computer Network & Security Expert

When you learned about the various technology products needed to secure an Internet perimeter, what differentiates one product from another in the marketplace? Why would a Cisco firewall be better than a SONICWall firewall, or is it? As you think about these questions, what might be some questions you'd ask a security product vendor when selecting firewalls, routers, and IDSs?

2-Please answer this post like discussion if you agree or disagree, and why? Please explain it. This post is the answer from somebody else about question #1.

When choosing firewall for network implementation, many things can differentiate one firewall from another. Firewalls can be different from each other according to what they offer. These are services that most firewalls offer today:
1.0 Full State Awareness, which has access to the "raw message," and can examine data from all packet layers. In addition, FireWall-1 analyzes state information from previous communications and other applications. The Inspection Module examines IP addresses, port numbers, and any other information required in order to determine whether packets comply with the enterprise security policy. It also stores and updates state and context information in dynamic connections tables.

2.0 Securing "Stateless" Protocols allows the firewall to understand the internal structures of the IP protocol family and applications built on top of them. For stateless protocols such as UDP aand RPC, the Inspection Module extracts data from a packet's application content and stores it in the state connections tables, providing context in cases where the application does not provide it. In addition, it can dynamically allow or disallow connections as necessary. These capabilities provide the highest level of security for complex protocols.

3.0 The Inspect language is based on using a checkpoint language for inspection of packets

4.0 Stateful Inspection: Under the hood to the firewall is able to ensure highest level of security, a firewall must be capable of accessing, analyzing and utilizing the following. The following functions are performed by stateful firewall: Communication Information - information from all seven layers in the packet
Communication-derived State - the state derived from previous communications. For example, the outgoing PORT command of an FTP session could be saved so that an incoming FTP data connection can be verified against it.
Application-derived State - the state information derived from other applications. For example, a previously authenticated user would be allowed access through the firewall for authorized services only.
Information Manipulation - the evaluation of flexible expressions based on all the above factors.
Check Point's Stateful Inspection is able to meet all the security requirements defined above.
Personally when designing network for a small or medium company I will choose Sonicwall over Cisco because of easy to configure that its firewalls offer, and the price that is much cheaper than Cisco's. In the opposite if I have to design a network for large company I will choose Cisco firewall because of the complexity of their system design, also because the name of Cisco which will give them more assurance than Sonicwall will do. The best thing to do is also mix both firewalls in the design since their interoperability is guaranteed.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91617453
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As