needed counter replys

In a standalone firewall, it is implemented at the network layer and hence all the traffic goes through the firewall (IPWithEase, 2017). On the other hand the embedded which can also be called as a host based firewall is implemented at the host level and hence only the traffic that’s going to the host will flow through its firewall (IPWithEase, 2017). Due to the way its constructed the standalone firewall cannot provide protection once inside the network unlike the embedded firewalls. In case of embedded firewalls, if an attacker somehow passes through it to gain access to the system then he will be able to disable the firewall using administrator privileges (O’Keeffe, 2017). The embedded firewall must be replaced especially the bandwidth exceeds the firewall throughput to not see slowness to the system. Whereas the standalone firewall can be scaled up as the bandwidth increases. The embedded firewalls need more man-power to be able to perform individual installations and maintenance (Jackson, n.d.).

Based on the above comparison both the types have their own advantages and disadvantages. If budget is not a limitation having a combination of both the types will provide an ultimate protection to the environment (O’Keeffe, 2017). However, in this case the budget is limited I will only be limited to pick only one type of install. Since the number of devices are small (~10) I would pick the Embedded firewall system. The other advantage is that if the standalone is installed since there is lot of traffic that researches push over the network all of this will go through the firewall which will slowdown. In cases we might even have to go back and look into expanding the bandwidth which might increase the costs as well. But with the elected embedded firewalls, only the traffic belonging to the specific host will pass through the firewall which will not be that bad.

References

IPWithEase. (2017, Sept 12). NEtwork based firewall Vs Host based firewall. Retrieved from IPWithEase: https://www.geeksforgeeks.org/introduction-of-fire…

Jackson, G. S. (n.d.). Host Vs Network based firewalls. Retrieved from ItStillWorks: https://itstillworks.com/hostbased-vs-networkbased…

O’Keeffe, A. (2017, Sept 13). Host-based Vs Network-based firewalls. Retrieved from Aussie Broadband blog: https://www.aussiebroadband.com.au/blog/host-based…

Firewalls are essential for the security of all internal and external networks and data from attacks. The firewall is a device intended to prevent unwanted connections from or to private networks. You may either create a firewall in the form of software or hardware, or a mix of both. Firewalls block unauthorized internet users from reaching internet-connected private networks, in particular intranets. All messages entering or exiting the intranet will move via the firewall, which reviews any message and prevents any that do not fulfill the safety requirements defined.

A firewall is a series of connected programs installed on a network gateway device, which defends a private network’s resources from traffic from other networks. An intranet-based organization that allows its workers to reach the broader internet implements a firewall to prohibit competitors from accessing their own private data services and restricting what other tools are accessed by their own customers. Basically, every network packet is analyzed by a firewall operating closely with a router system to decide how to forward it into its target. Even a firewall requires or operates with a proxy server allowing network demands on half of the users of the workstations. A firewall is also built independently from the rest of the network in a specifically configured device, such that no incoming request can be received directly from the private network infrastructure. There are a variety of ways to control the firewall. A simple one is to track requests to ensure they originate from suitable domain names and addresses of the internet protocol. Several types of firewalls are as follows: packet filtering, circuit-level gateway implementation, web application firewall, acting as a proxy server.

REFERENCE

Lee, S., Kiblin, T., Jessica Davis, J.-P. S. R., Harris, J., MacVittie, L., Edwards, J., … CBT Nuggets. (2019, January 10). Firewalls 101: How To Choose The Right One. Retrieved from https://www.networkcomputing.com/data-centers/fire…

TechTarget. (2009, February 16). How does a firewall work? Retrieved from https://searchnetworking.techtarget.com/tutorial/H…

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Looking for a Similar Assignment? Our Experts can help. Use the coupon code SAVE30 to get your first order at 30% off!