From the course: Firewall Administration Essential Training
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Firewall deployment: Hardware vs. software
From the course: Firewall Administration Essential Training
Firewall deployment: Hardware vs. software
- [Instructor] In the succeeding topics, we shall now cover the various ways of how a firewall can be deployed. Specifically, we'll look at hardware versus software firewall, network-based and host-based firewall and cloud-based firewall. Let's start with hardware and software firewalls. A hardware firewall, as the name implies, is a physical firewall device that is used to scan and filter the network traffic. They're primarily network based security devices operating at the network level, protecting against external threats. Hardware firewalls are typically placed between the internal network and the external network or the internet. The boundary between the internal network and the external network is known as the network perimeter, and so for that matter, a firewall that is placed in this boundary is known as a perimeter firewall. Now, with this deployment, the firewall acts as the first line of defense against attacks providing centralized protection for all devices that are…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.