Classification of Firewall Issues Given that: Showing the issues arising when firewalls are located within the communication path. Describes the issues of each specific application in a more...

1 answer below »

Classification of Firewall Issues


Given that:

  • Showing the issues arising when firewalls are located within the communication path.

  • Describes the issues of each specific application in a more structured way, defining the following classes of problems:


o Software
o Hardware
o Network
o Security policy
I have a project, but only I need an abstract and interaction for it, could you do it ?


Document Preview:

Classification of Firewall Issues Given that: Showing the issues arising when firewalls are located within the communication path. Describes the issues of each specific application in a more structured way, defining the following classes of problems: o Software o Hardware o Network o Security policy We will recognize two categories of firewall issues and further subdivide them accordingly. Issues are either caused by: The fact that the application is unaware of the network. The fact that the network is unaware of the application. The classification is made based on the assumption that both the network and the application may not be aware of each other in terms of requirements. Typically, the application assumes network transparency. However, the application also expects secure and reliability operation and therefore expects to be protected against malicious intends. Both expectations require some understanding between the application and the network. We therefore approach the classification from the above listed observations. At this point we do not seek solutions for these issues, we sometimes only hint towards them. Issues caused by the application having difficulties to be aware of network needs This is an issue were applications try to adapt towards the needs of the network. This paragraph tries to map each firewall issue as identified in the following four categories: software, hardware, network, and security policy. Software and port numbers Port numbers and number of ports are unknown until the application starts. The consequence is that firewall administrators need to create big holes (up to 10.000 ports) if the application is not capable of determining the amount of ports to be used and/or the port numbers are unknown. Trying to push all traffic though a single hole (e.g. HTTP port 80) causes referral problems. In general, only specific, predetermined applications that use a low number of very well defined ports (or “well-known ports”) can be...



Answered Same DayDec 26, 2021

Answer To: Classification of Firewall Issues Given that: Showing the issues arising when firewalls are located...

Robert answered on Dec 26 2021
123 Votes
Abstract
Authorized access of a network is managed by employing firewall into the network. Firewall
serves as network gatekeeper and only allows those traffic to o
utbound and inbound to the
network which is authorized by the defined network access policies. Besides the rules and access
policies provided through firewall there are many issues related with firewall. Basically, there
are two board categories of issues of the firewall caused by applications unawareness to the
network and network unawareness to the applications. Application unawareness to the network
problem has four categories of issues such as software and port number awareness, hardware like
number of firewalls, Application position in the network and Security policy deployed through
the firewall. Firewalls are categorized as packet filtering, circuit level gateway, Application level
gateway and stateful. Availability of these versatile categories of firewalls do not guarantee
about the 100% security due to predominant issues. In this paper it is proposed that to reduce the
issue by considering the verity of firewall which efficiently manages the security to the network.
Small business firewall is featured powerful for 802.11 AC wireless network and gigabit network
switches. Network and business perimeter security is employed by deploying the enterprise level
firewall such as internal firewall. The multi site coordinated firewalls are suitable for providing
optimum security for the multi-site network of the business.
Introduction
At present the security is primary concern for the business information system. This becomes
mandatory requirement to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here