18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Internet Security 305<br />

the IP address of its source and destination. Packet filters check this<br />

address information of each and every packet, <strong>to</strong> determine whether it<br />

is acceptable or not. The administra<strong>to</strong>rs set up the firewall rules on the<br />

basis of whether it filters the incoming traffic and allows/disallows<br />

connections.<br />

Routers, which direct information packets, can provide some firewall<br />

support because their function is <strong>to</strong> forward and filter data packets.<br />

Some sophisticated routers provide additional facilities such as encryption<br />

features.<br />

These types of firewalls are usually the least expensive. However,<br />

they do not offer much flexibility and also slow down the performance<br />

of the network considerably.<br />

Application level firewalls<br />

Application level firewalls work by handling the traffic destined for a<br />

specific application such as e-mail or FTP, rather than all network<br />

traffic (see Figure 10.14).<br />

Application level firewalls are like a relay system between the<br />

Internet and the internal network; they do not allow direct traffic <strong>to</strong><br />

pass between the two networks. In these, a highly isolated machine,<br />

called an application gateway, proxy gateway, or proxy server is used.<br />

This machine runs programs called proxies; a separate proxy is run for<br />

each Internet service, such as HTTP and FTP.<br />

Since all interaction of the external users is with the proxies, this<br />

allows all passwords and internal IP addresses <strong>to</strong> remain internal,<br />

making them more difficult <strong>to</strong> detect and misuse.<br />

External<br />

Network<br />

Network<br />

Laval<br />

Figure 10.14. — Application level firewall schematic

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!