cookieOption={We use cookies to personalize content and ads, to provide social media features and to analyze our traffic. We also share information about the use of our site by you with social media, advertising, and analytics that may combine it with other information you provide or which they have collected from your use of their service} STAR VILLAGE GROUP SOFTWARE: January 2013
English French German Spain Italian Dutch Russian Portuguese Japanese Korean Arabic Chinese Simplified

English French German Spain Italian Dutch Russian Portuguese Japanese Korean Arabic Chinese Simplified

Saturday, January 12, 2013

MikroTik RouterOS Firewall

|0 komentar
MikroTik RouterOS Firewall stands between the company’s network and a public
netvork, effectively shielding your computers from malicious hacker activity, and
controlling the flow of data to the router, through the router, and from the router.
MikroTik RouterOS firewall supports filtering and security functions that form your
Internet using policy.
Stateful Filtering
MikroTik RouterOS Firewall is based on Stateful Filterig technology that can be
used to detect and block many stealth scans, DoS attacks, SYN floods. Network
communication is made up of small chunks of data called packets, and several
of these packets are used solely to create, maintain, and finish the connection.
The MikroTik RouterOS Stateful Firewall keeps in memory informtion on each
connection passing through it. When a foreign packet tries to enter the network,
claiming to be part of an existing connection, the firewall consults it's list of
connections. When it finds that the packet doesn't match any of these, it can drop
that packet and defeat the scan!
System Administration
MikroTik RouterOS Firewall is very easy to manage! System’s architecture
allows easy configuration of network address translation (NAT), transparent
proxies, and redirection. The Firewall filtering rules are grouped together in
chains. It is very advantageous, if packets can be matched against one common
criteria in one chain, and then passed over for processing against some other
common criteria to another chain. That makes the system a whole lot easier to
administrate, using a smaller number of rules to create much more precise firewalling.

Popular Posts

Followers