From the course: Firewall Administration Essential Training

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Firewall deployment: Hardware vs. software

Firewall deployment: Hardware vs. software

From the course: Firewall Administration Essential Training

Firewall deployment: Hardware vs. software

- [Instructor] In the succeeding topics, we shall now cover the various ways of how a firewall can be deployed. Specifically, we'll look at hardware versus software firewall, network-based and host-based firewall and cloud-based firewall. Let's start with hardware and software firewalls. A hardware firewall, as the name implies, is a physical firewall device that is used to scan and filter the network traffic. They're primarily network based security devices operating at the network level, protecting against external threats. Hardware firewalls are typically placed between the internal network and the external network or the internet. The boundary between the internal network and the external network is known as the network perimeter, and so for that matter, a firewall that is placed in this boundary is known as a perimeter firewall. Now, with this deployment, the firewall acts as the first line of defense against attacks providing centralized protection for all devices that are…

Contents