Solved

Zone based firewalls

Posted on 2011-02-18
2
410 Views
Last Modified: 2012-05-11
I am new to the world of firewalls... and going over the ZBFWs. I am not sure what is the motive for creating such a FW, I see am example where the INSIDE and outside are grouped as int zones and the traffic is inspected with policy maps, all within a router. Well, all this could be done with prev int based ACL rules. What is something that is pushing for the need to have ZBFWs.

thanks,
0
Comment
Question by:totaram
2 Comments
 
LVL 6

Accepted Solution

by:
PJBX earned 125 total points
ID: 34931178
I've not used ZBFWs in a production environment, but "supposedly" a ZBF is more robust than simply controlling access.

It allows you to inspect traffic and block any traffic with potentially malicious code. By creating the zones, you can set additional rules based on your group/zones

0
 

Author Comment

by:totaram
ID: 34933310
Good logic, but everything is still within a router, how does it prevent any attacks...
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question