Question

In: Computer Science

You want to use a packet firewall to protect the Hospital network but you are hesitant...

You want to use a packet firewall to protect the Hospital network but you are hesitant to choose the right location among the following: putting it on the web server at DMZ, putting it along with the IDS server, putting it on the screened subnet with DMZ, or putting it on the domain boundary. Recommend the right answer with justification as to why or why not.  

Solutions

Expert Solution

Packet firewall is a type of firewall which district or allowed the packet at the network layer. It means that the packet firewall will check for IP address before allowing or disallowing the packet inside the network. The packet firewall should be kept at a position outside of network boundry which will initially filter all the unwanted packet and the packet now you must move towards the network boundary. Installing firewall on the web server will protect the web server only and it will not protect the unauthorised traffic towards other service such as file server, email server or other network devices such as switch and router inside the network. Packet firewall can be put on the DMZ boundary containing Web Server to isolate web server and filter traffic towards DMZ and Internal secured LAN.

Placing firewall aside the DMZ:

Therefore the best position to place firewall is on the domain boundary. A secondary firewall may be put aside DMZ to protect malicious access to internal router or file server. This way, most of the attacks are mitigated at the DMZ and External firewall only.

Therefore, primary firewall can be put on the domain boundary and secondary firewall, if required can be put aside the DMZ for an extra added layer of security.


Related Solutions

Why is this firewall considered as a stateful firewall instead of a packet filter?
Why is this firewall considered as a stateful firewall instead of a packet filter?
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference...
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference between types of firewalls.
How is an application layer firewall different from a packet-filtering firewall? Why is an application layer...
How is an application layer firewall different from a packet-filtering firewall? Why is an application layer firewall sometimes called a proxy server? What is stateful inspection? What is a VPN? Why is it becoming more widely used? What is content filtering, and should it be leveraged on a corporate network? Backup your statement with 2 or 3 facts. Please pick two peer posts for your responses. Do you agree with their statements on content filtering or disagree and why? Are...
Stateless packet filtering is performed on a per-packet basis. True False A typical enterprise firewall has...
Stateless packet filtering is performed on a per-packet basis. True False A typical enterprise firewall has at minimum the following interfaces? Outside Inside DMZ All of the above Which Vagrant providers are not shipped with the software? Virtualbox Hyper-V Nutanix Docker
How will an SPI firewall handle a packet containing a TCP segment which is an acknowledgement?
How will an SPI firewall handle a packet containing a TCP segment  which is an acknowledgement?
In packet switched network, store and forward refers to transmitting packet to the next link after...
In packet switched network, store and forward refers to transmitting packet to the next link after entire packet arrives at router scheduling of packet transmission to avoid congestion transmitting packet to the next link while router is receiving the packet    storing entire packet at router until acknowledgment is received Which of the following HTTP methods allows a user to upload an object to a specific path on a Web server? HEAD GET PUT POST Which of the following is NOT...
What is the main differences between Packet Switch Network & Circuit Switch Network?
What is the main differences between Packet Switch Network & Circuit Switch Network?
Network Device Basics Directions: Use Packet Tracer to complete the following labs. Answer the questions and...
Network Device Basics Directions: Use Packet Tracer to complete the following labs. Answer the questions and record screenshots in a Word document titled firstInitial+LastName+Basics. Find Device Information You are working with a single active switch and a router as shown in Diagram 1. You would like to gather information about the device. Execute this lab according to the following guidelines: Use the CLI to answer the following questions: What is the IOS version? How much NVRAM (non-volatile RAM) is available...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
As the network administrator for a growing ISP, you want to make efficient use of your...
As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the networks addresses IANA assigned to you is a Class C network of 192.168.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 18 corporate customers who need between 20 and 24 addresses each. calculate a subnet mask that meets their needs. List the subnet mask and the first four...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT