Introduction
Using the load-sharing setup is beneficial because it improves the total network performance by balancing the existing firewalls and the routing protocols that distribute the traffic found in the current routers (Zhichao, Daiwu & Wenhua, 2017). The most significant benefit is that it's easy to maintain through one firewall without affecting the entire network traffic on the same firewalls. The downside of it is that the load is distributed between sharing the firewalls and does not include over-functiooductionns. However, the process depends if the failover connections support the firewalls.
Four Software Programs And Hardware Devices That Do Packet Filtering
The software programs and hardware devices come in varieties to perform the packet filtering process. First, the routers which are typical of all have the ability of basic packet filtering but through withdrawals. Second, the operating system, such as Linux and Windows, contains utilities that filter the packets of the TCP/IP through the server software. Linux, in this case, includes a kernel-level package known as the IPtables (Wang, 2012). Windows, on the other hand, has the TCP\IP filtering.
Third Software firewalls contain enterprise-level programs like filter packets, Check Point FireWall-1, and personal firewalls like Sygate firewall and ZoneAlarm. However this system in general is more sophisticated as compared to the ones on the enterprise level. Last, is the firewall appliances which only have software and hardware devices as a self-contained component. Every time a customer buys the firewall tools, they also get a device that is connected to the configured network and then puts it in operation (Wang, 2012). The client also receives the networking, hardware, and software components all under one package.
Devising A Firewall Strategy That Facilitates The Connection Of The FTP
The first step would be setting up a VPN between the two existing networks to allow sharing of the data via the File Transfer Protocol Security but through SSL. Then I will block the outbound and inbound traffic on the FTP port 21 to allow the outbound and inbound traffic connect on port 990 (Jang & Baek, 2018). The reason behind this step is because the FTP acts as the inceptor to the internet. In this stage, the developers will be working on the TCP/IP.
Since the FTP standards are 354, 265, 172, and 114, it will be able to focus on security and the development of the devices (Jang & Baek, 2018). This will allow users to access the FTP through the client-server function. The reason why I would recommend people to use FTP is that many organizations use it, and it is easier for file access and showing (Jang & Baek, 2018). The system also allows someone to access the file via mobile phones. Moreover, the user can sync the documents with other devices through online and offline methods. Since the setup is done through the VPN, then security is assured because unless someone is using the same network, they are unable to change or remove any file or information.
Increasing The Security Profile Concerning SMTP
If I am asked to raise the security profile of an organization about the SMTP, then I will go for the application-level firewalls. The reason behind my claim is that this system is able to scan and filter the packet because of additional validation. This is because the application-level has the ability of scanning the packet payload such as commercial protocols, authorization and packet lengths through content of invalid headers (Lara & Gracia, 2010). The initial connection of the application-level firewall is also established to conduct services to SMPT, FTP, and many more.
Another reason why I would recommend this type of firewall is that it has a similar filtering channel as that of the packet filtering firewall. Due to this the gateway is able to stop the application level attacks as discussed above. Also the system hides the protected network when filtered from the internet (Lara & Gracia, 2010). Lastly, the application provides secure logging of the in and out traffic for the firewall. As a result, a record of any successful or failed break-ins is saved to protect the network. If logging in becomes a problem, then it is evident that someone was attempting or broke in the system. The user then has an idea who tried to interfere with the network.
References
Jang, G.-N., & Baek, E.-S. (2018). A Study on the Revision of the Fire Safety Standard of the Fire Department Connection. Fire Science and Engineering, 32(5), 67-76. DOI: 10.7731/kifse.2018.32.5.067
Lara, J. G., & Gracia, A. P (2010). Building Web Application Firewalls in High Availability Environments. Web Application Security Communications in Computer and Information Science, 2(1), 75-82. DOI: 10.1007/978-3-642-16120-9_18
Wang, L.-J. (2012). Research on the Effectiveness of Distributed Packet Filtering Based on Inter-Domain Routing. Journal of Software, 23(8), 2130-2137. DOI: 10.3724/sp.j.1001.2012.04134
Zhichao, P., Daiwu, C., & Wenhua, H. (2017). A Load-Balancing and State-Sharing Algorithm for Fault-Tolerant Firewall Cluster. 2017 4th International Conference on Information Science and Control Engineering (ICISCE), 1(1), 221-244. DOI: 10.1109/icisce.2017.17
Cite this page
Essay Example on Load-Sharing Setup: Benefits, Maintaining & Downsides. (2023, Apr 18). Retrieved from https://proessays.net/essays/essay-example-on-load-sharing-setup-benefits-maintaining-downsides
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Email Scams and Phishing Scams - Research Paper
- Research Paper on Dynamic Web Design
- Waiting Room Solutions as a Comprehensive Enterprise-Level System Paper Example
- Device-Based Security to Improve User Privacy Article Reviw Paper Example
- Research Paper on Ethics and Cybersecurity Awareness
- Annotated Bibliography on Cybersecurity
- Essay Example on Programmable Logic Controllers: Technological Evolution of Automation