Professional Documents
Culture Documents
In mobile service a VPN reduces security risk by allowing access to specific network resources to only
users who are authorized, encrypting data and thereby protecting against insecure Wi-Fi access, and
providing continuity of centralized unified threat management.
2.An ACL (Access Control List) is specifically allowed or contradict specific packets to move from an
interface. It has several purposes like processing traffic in an interface, utilizes record to filter
notifications of routing, stay in a caller record to recognize specific traffic, exploit in strategy-depended
routing to create a routing declaration. A firewall is used to monitor traffic which is transmitting through
the network and create declarations about allowed things and blocked things
ACL performs stateless observation, which denotes that the record of access searches at a packet and has
no idea of what has transmitted before it. Firewalls do stateful observation. While exploiting protection
services in systems, users might be disputed with the decision on whether to use ACL or Firewall to
protect the local area network computers. ACL filters the traffic same as Firewall perform but these
firewalls are greatly performed more than that traffic filtering
Firewalls can be software or hardware based. Hardware based firewalls are preferred
choice when it comes to large deployments requiring dedicated appliances to address
security requirements. Unlike Firewalls, ACLs are features on Routers and Layer 3
devices. Further, ACLs (Standard or extended) can perform traffic control up to Layer 4
i.e. ports and protocols while Firewalls can reach up to Layer 7 (Application Layer) of
OSI model.