what is firewall?How it differs from ACLS?
Answers were Sorted based on User's Feedback
Answer / ishita
A firewall is a part of the computer or network which
prevents unauthorized access to it.Firewalls are frequently
used to prevent unauthorized Internet users from accessing
private networks connected to the Internet.It regulates
traffic of the network of different trust levels.
On the other hand,Access Control List refers to rules that
are applied to port numbers or network daemon names that are
available on a host, each with a list of hosts and/or
networks permitted to use the service. Both individual
servers as well as routers can have network ACLs.
This way. ACL are the rules to be implemented for security
while firewall is he complete setup or mechanism.
| Is This Answer Correct ? | 13 Yes | 2 No |
Answer / durai
Firewall provides a permission or destroys for a packet to
enter inside our network from private network .
Acl's which provide rules to control which type of packet
to be destroyed or permitted
| Is This Answer Correct ? | 14 Yes | 5 No |
Answer / vishnu raaz
firewall is a network component it is commonaly use in
network for prevent attack from internet.Acl's which
provide rules to control which type of packet
to be destroyed or permitted
| Is This Answer Correct ? | 11 Yes | 2 No |
Answer / arun
A firewall is a secure and trusted machine that sits between
a private network and a public network.
Access Control List is a list of permissions attached to an
object.The list specifies who or what is allowed to access
the object and what operations are allowed to be performed
on the object.
| Is This Answer Correct ? | 12 Yes | 5 No |
Answer / shailandra prakash trivedi
A firewall is a secure and trusted machine that sits between
a private network and a public network.
Access Control List is a list of permissions attached to an
object.The list specifies who or what is allowed to access
the object and what operations are allowed to be performed
on the object.
| Is This Answer Correct ? | 5 Yes | 3 No |
Answer / avdhesh singh yadav jhansi (u.
Firewall provides a permission or destroys for a packet to
enter inside our network from private network .
Acl's which provide rules to control which type of packet
to be destroyed or permitted
| Is This Answer Correct ? | 2 Yes | 1 No |
Answer / pravin
Firewall-is a mechanism.
ACL is set of rule.
And we can say mechanism is reversible in nature while rule are irreversible.Means firewall check both side of data when we want to send or we receive while in ACL rules are applied only on instructed interface means on inside or out side.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / devroy
An ACL is a basic level of stateless packet filtering. If
that meets your (low) security requirements, then that's
fine.
A firewall generally includes stateful packet inspection.
This will provide a higher level of security than an ACL.
That said, you need to look at the specific
implementations, as what one vendor calls an ACL another
may call a firewall.
Look at
http://www.eetasia.com/ARTICLES/2002APR/2002APR08_ICD_NTEK_R
FD_CT_MSD_TAC.PDF
| Is This Answer Correct ? | 1 Yes | 1 No |
Explain network equipment used in wired-LANS and explain the function of Hub, Switch, and bridge.
What is virtual path
How to upagrade antivirus through network ?
I have 2 networks. One is LAN & other is Tata Indicom Modem which is connected to USB. The problem is that When USB Modem is using, i am unable to use LAN. And when we use LAN, we cannot use USB Modem. kindly help me.
up to which ver of linux using lilo boot loader? last ver of linux.
Explain Any Standalnoe Application with rispect to OSI model, letus Consider Voice Recognition....!! One Has To tell function of all layers with rispect to given Application.
When is a translating bridge used ?
When you look at a Cisco switch like Cisco 2950, why are the ports labeled with an 'X' behind the number? Like 1x, 2x.....23x, 24x, and what does it mean when there is no 'X'?
Compare satellite with fiber as a communication medium and enumerate the application areas where satellite still holds a niche(or special)marker.
What does ‘data transparency’ mean ? With the help of a flow chart, explain the process of bit de-stuffing at the receiver’s end.
Explain leaky bucket algorithm and compare it with token bucket algorithm.
What is multicast routing