As reflected by the name a dual homed host architecture is a computer having two network connections separately for two network interfaces. Such host work as router among two networks however when dual homed hosts architectures are implemented in firewall this routing function is disabled.
As routing function is disabled and IP packet is also blocked completely thus the host isolates two network completely from each other thus directly routing between the networks is completely blocked. Systems inside such firewall and systems outside the firewall can communicate with the dual homed host, however such systems are not able to communicate directly with each other.
In dual homed host architecture a single machine …show more content…
Moreover users also consider it inconvenient to use by logging into the dual homed host.
3. Screened Subnet Architecture:
The screened subnet architecture approach is driven from the idea of screen host architecture, a step further. Since the screening router is present at the primary entry point of the network and screens traffic flow between protected network and internet, an addition of further security layer to it by perimeter network which will isolate the secured network from external affects, will give birth to screened subnet architecture.
As bastion hosts on a network are vulnerable machines by nature and despite of measures to protect them these are the machines commonly to be attacked. In screened host architecture all internal network is open to be attacked from bastion host so bastion host is a very soft target. There are no any other barriers between it and machines within the internal network. If someone will be able to approach into the bastion host in screened host architecture, he may hit …show more content…
So if someone who will attack and break into a machine on an external perimeter net will face a harder and tough time while attacking internal machines because more security layers are there between internal network and outer perimeter. This situation will arise and will be true and significant only if there is existence of different layers by meaning otherwise additional layers will not provide additional security because of the same filtering systems between all