Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Zone based firewalls

Posted on 2011-02-18
2
Medium Priority
?
416 Views
Last Modified: 2012-05-11
I am new to the world of firewalls... and going over the ZBFWs. I am not sure what is the motive for creating such a FW, I see am example where the INSIDE and outside are grouped as int zones and the traffic is inspected with policy maps, all within a router. Well, all this could be done with prev int based ACL rules. What is something that is pushing for the need to have ZBFWs.

thanks,
0
Comment
Question by:totaram
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 6

Accepted Solution

by:
PJBX earned 500 total points
ID: 34931178
I've not used ZBFWs in a production environment, but "supposedly" a ZBF is more robust than simply controlling access.

It allows you to inspect traffic and block any traffic with potentially malicious code. By creating the zones, you can set additional rules based on your group/zones

0
 

Author Comment

by:totaram
ID: 34933310
Good logic, but everything is still within a router, how does it prevent any attacks...
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing h…
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question