Building A Stealth Firewall
Stealth has an advantage of gaining access undetected. A stealth firewall provides a way to gain access to filtering Internet traffic from a position of stealth. A bridge provides stealth because it does not use an IP Address to function but rather operates at the Layer 2 of the OSI model meaning that without an IP Address the firewall is unaccessible and hidden from all would be attackers. This course will show you how to build a stealth firewall that you can drop in anywhere on your network to protect some aspect of the network.
|
|
Full Story |
This topic does not have any threads posted yet!
You cannot post until you login.