a. Why are screening routers used in a firewall architecture? b. Why are internal firewalls desirable? c. Why is it easier to create appropriate ACL rules for server host firewalls than for border firewalls? d. How does the use of border, internal, and host firewalls provide defense in depth?
a. Distinguish between firewall policies and ACL rules. b. Why is creating firewall policies desirable compared to just creating a list of ACL rules? c. Create three firewall policies not listed in the text
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here