Guide to Computer Network Security by Joseph Migga Kizza

Guide to Computer Network Security by Joseph Migga Kizza

Author:Joseph Migga Kizza
Language: eng
Format: epub, pdf
Publisher: Springer London, London


Other configurations of firewalls depend on the structure of the network. For example, in a set up with multiple networks, several firewalls may be used, one per network. Security in a protected network can further be improved by using encryption in the firewalls. Upon receipt of a request, the firewall encrypts the request and sends it on to the receiving firewall or server which decrypts it and offers the service.

Firewalls can also be equipped with intrusion detection systems (IDS). Many newer firewalls now have IDS software built into them. Some firewalls can be fenced by IDS sensors as shown in Fig. 12.11.

Fig. 12.11Firewalls with IDS sensors



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.