![]() It stops hackers from entering your network.A firewall limits the Trojan horse from latching onto your computer files and does damage to the entire network.A two-way firewall can monitor the exiting data as well and can encrypt it too. A firewall can monitor all the incoming traffic.An example of an access control list is shown below: Permit And this is how security is ensured in a private network. This list is customizable and the network administrator can, not only prevent what can enter the network but also what leaves a network. This list may contain allowed and denied port numbers, internet protocol used by the request, and IP addresses. These rules are known as the access control list. There are specific access control policies or rules set by the administrator that governs what data packet is allowed and what is not. It is a full-proof barrier for monitoring, protecting, and auditing the local computer network from external security threats. A data packet can enter a network only if the firewall allows it to enter. It works at an IP packet level and can filter data packets entering into a private network. A firewall is a software or application that protects a local network of computers or devices by limiting or blocking access to some unauthorized users sitting outside the network. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |