COMPUTER THREATS SECURITY
WHAT IS A FIREWALL IN NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Layer 3
|
|
Layer 5
|
|
Layer 7
|
|
Layer 2
|
Detailed explanation-1: -Firewalls configured in transparent mode are also sometimes referred to as bridging, layer-2 or stealth firewalls since they operate at layer 2 of the OSI reference model (Tanase, 2003).
Detailed explanation-2: -When a firewall is Transparent it is configured to operate at Layer-2 of the OSI model, the Data Link layer.
Detailed explanation-3: -Firewalls deployed in Layer 2 mode provide the most transparent method for integrating with existing routing and IP designs as well as existing services-load balancers, etc. In the case of Layer 2 firewalls, the preservation of existing server gateways, IP subnets, and addressing is preserved.
Detailed explanation-4: -A firewall generally works at layer 3 and 4 of the OSI model. Layer 3 is the Network Layer where IP works and Layer 4 is the Transport Layer, where TCP and UDP function.
Detailed explanation-5: -With transparent Layer 2 bridging: All network traffic is delivered using Layer 2 lookups. The source MAC address is propagated in connection requests. The bridged network nodes cannot locally communicate with the interface. The bridge requires a separate interface that makes it accessible for configuration.