A firewall is just a term that is commonly applied to layer 3 (and
above) devices and has become synonomous with IP. However, it is
possible to implement security at layer two on bridges using a number of
standard and proprietary methods. The standard methods would include the
use of non-router VLAN implementations and MAC address filtering. Many
manufacturers also provide extensions to these standards, e.g. Cisco and
PVLAN implementation, and their own proprietary security features. Most
manufacturers will allow for the tracking of specific MAC source
addresses on inbound bridge ports. This allows a port to be blocked if
an unknown address is encountered. Searching the manufacturer
documentation for "port security" would be a good idea. It is also
possible to implement MAC address filters to filter traffic via
source/destination MAC address. Bridge filters are also commonly
employed which are able to filter out traffic according to frame type,
e.g. 0x800 (IP). Many frames carrying certain types of protocol payload
can be filtered in this manner. 

So, in summary a firewall is really just an element (network or
software), that sits between a trusted and non-trusted zone and is
employed in filtering traffic according to a pre-defined policy. It can
work from layers 2 to 7 (OSI reference model), but is commonly
associated with layer 3 upwards (within the IP community).

I hope this helps.

Cheers,

Mark Searle. 

-----Original Message-----
From: ashley thomas [mailto:[EMAIL PROTECTED]]
Sent: 06 January 2002 02:17
To: [EMAIL PROTECTED]
Subject: Firewall: a basic question


hi,

which is the lowest layer where a firewall can be implemented ?
i guess, it is network layer (layer 3)

in that case , how is firewall implemented on bridges , which is a layer
2 
device ?

thanks
ashley




_________________________________________________________________
Chat with friends online, try MSN Messenger: http://messenger.msn.com



        Email Disclaimer

The information in this email is confidential and may be legally privileged.
It is intended solely for the addressee.  Access to this email by anyone else
is unauthorised.
If you are not the intended recipient, any disclosure, copying, distribution
or any action taken or omitted to be taken in reliance on it, is prohibited
and may be unlawful.  When addressed to our clients any opinions or advice
contained in this email are subject to the terms and conditions expressed in
the governing KPMG client engagement letter.

Reply via email to