Network Services - Unified Threat Management Flashcards
Access Control List (ACL)
Rule sets placed on the firewalls, routers, and other network devices that permit or allow traffic through a particular interface. Actions are performed top-down inside of an ACL
FIrewall
Inspects and controls the traffic that is trying to enter or leave a network’s boundary
Unified Threat Management (UTM)
Provides the ability to conduct security functions within a single device or network appliance
UTM advanatages
-Reduced number of devices to learn, operate, and maintain
-Lower upfront costs, maintenance, and power consumption
-Easier to install and configure
UTM Disadvanatages
-Single point of failure
-Lack detail provided by a specialized tool
-Performance is not as efficient as single function devices