Published at LXer:
Stealth has an advantage of gaining access undetected. A stealth firewall provides a way to gain access to filtering Internet traffic from a position of stealth. A bridge provides stealth because it does not use an IP Address to function but rather operates at the Layer 2 of the OSI model meaning that without an IP Address the firewall is unaccessible and hidden from all would be attackers. This course will show you how to build a stealth firewall that you can drop in anywhere on your network to protect some aspect of the network.
Read More...