You are on page 1of 1

1.

Main reasons using a VPN include

 the ability to hide a user’s IP address, location and browsing history


 secure the connection with encrypted data between the two end hosts
 bypassing geo-blocked content

In mobile service a VPN reduces security risk by allowing access to specific network resources to only
users who are authorized, encrypting data and thereby protecting against insecure Wi-Fi access, and
providing continuity of centralized unified threat management.

2.An ACL (Access Control List) is specifically allowed or contradict specific packets to move from an
interface. It has several purposes like processing traffic in an interface, utilizes record to filter
notifications of routing, stay in a caller record to recognize specific traffic, exploit in strategy-depended
routing to create a routing declaration. A firewall is used to monitor traffic which is transmitting through
the network and create declarations about allowed things and blocked things

ACL performs stateless observation, which denotes that the record of access searches at a packet and has
no idea of what has transmitted before it. Firewalls do stateful observation. While exploiting protection
services in systems, users might be disputed with the decision on whether to use ACL or Firewall to
protect the local area network computers. ACL filters the traffic same as Firewall perform but these
firewalls are greatly performed more than that traffic filtering

 Firewalls perform Stateful inspection while ACLs are limited to being Stateless only. Stateful is a


per-flow packet inspection, whereas Stateless (ACL) is a per-packet packet inspection. In other
words, ‘state’ of flow is tracked and remembered by traditional firewall. In fact, firewalls can also
understand the TCP SYN and SYN-ACK packets which can’t be performed by ACL on Routers or
Layer 3 Switches. In addition to address/port matching and connection state management, many
more advanced firewalls are able to use deep packet inspection to track application-layer behavior.

Firewalls can be software or hardware based. Hardware based firewalls are preferred
choice when it comes to large deployments requiring dedicated appliances to address
security requirements. Unlike Firewalls, ACLs are features on Routers and Layer 3
devices. Further, ACLs (Standard or extended) can perform traffic control up to Layer 4
i.e. ports and protocols while Firewalls can reach up to Layer 7 (Application Layer) of
OSI model.

You might also like