{"id":21325,"date":"2021-01-20T10:03:10","date_gmt":"2021-01-20T10:03:10","guid":{"rendered":"https:\/\/lmtech.asia\/lmt\/?p=21325"},"modified":"2021-01-25T09:05:29","modified_gmt":"2021-01-25T09:05:29","slug":"types-of-firewall-2","status":"publish","type":"post","link":"https:\/\/lmtech.asia\/lmt\/types-of-firewall-2\/","title":{"rendered":"Types of Firewall"},"content":{"rendered":"\n<p>Firewall \u1006\u102d\u102f\u1010\u102c\u1000 \u1000\u103b\u103d\u1014\u103a\u1010\u1031\u102c\u103a \u1010\u102d\u102f\u1037\u1010\u103d\u1031\u101b\u1032\u1037 organization \u1019\u103e\u102c Computer \u1019\u103b\u102c\u1038\u101e\u100a\u103a \u1010\u1005\u103a\u101c\u102f\u1036\u1038\u1014\u103e\u1004\u1037\u103a\u1010\u1005\u103a\u101c\u102f\u1036\u1038 \u1021\u1015\u103c\u1014\u103a\u1021\u101c\u103e\u1014\u103a Network \u1001\u103b\u102d\u1010\u103a\u1006\u1000\u103a\u1011\u102c\u1038\u1015\u103c\u102e\u1038 \u1000\u103b\u103d\u1014\u103a\u1010\u1031\u102c\u103a\u1010\u102d\u102f\u1037\u101b\u1032\u1037\u1021\u101b\u1031\u1038\u1000\u103c\u102e\u1038\u1010\u1032\u1037 Data \u1019\u103b\u102c\u1038\u1000\u102d\u102f Network \u1015\u1031\u102b\u103a\u1000\u1014\u1031\u1010\u1005\u103a\u1006\u1004\u1037\u103a \u101c\u1000\u103a\u1001\u1036\u1010\u1032\u1037\u1014\u1031\u101b\u102c\u1019\u103e\u102c Hacker,Attacker, \u1014\u103e\u1004\u1037\u103a \u1000\u103b\u103d\u1014\u103a\u1010\u1031\u102c\u103a \u1010\u102d\u102f\u1037\u101b\u1032\u1037 organization \u1019\u103e\u102c \u101b\u103e\u102d\u1010\u1032\u1037 staff \u1010\u103d\u1031 \u101e\u1030\u1010\u102d\u102f\u1037 \u1014\u1032\u1037\u1019\u101e\u1000\u103a\u1006\u102d\u102f\u1004\u103aData \u1010\u103d\u1031\u1000\u102d\u102f Access \u101c\u102f\u1015\u103a\u1001\u103d\u1004\u1037\u103a\u1019\u101b\u103e\u102d\u1021\u1031\u102c\u1004\u103a \u1000\u103b\u103d\u1014\u103a\u1010\u1031\u102c\u103a\u1010\u102d\u102f\u1037\u101b\u1032\u1037\u1021\u101b\u1031\u1038\u1000\u103c\u102e\u1038\u1010\u1032\u1037 Data \u1010\u103d\u1031 \u1019\u1006\u102f\u1036\u1038\u101b\u103e\u102f\u1036\u1038\u101e\u103d\u102c\u1038\u1021\u1031\u102c\u1004\u103a \u1001\u102d\u102f\u1038\u101a\u1030\u1019\u103e\u102f\u1019\u1001\u1036\u101b\u1021\u1031\u102c\u1004\u103a \u1000\u102c\u1000\u103d\u101a\u103a\u1015\u1031\u1038\u1010\u1032\u1037\u1014\u1031\u101b\u102c\u1019\u103e\u102c \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u101b\u1010\u102c\u1010\u1032\u1037 Device \u1000\u102d\u102f Firewall \u101c\u102d\u102f\u1037\u1001\u1031\u102b\u103a\u1015\u102b\u1010\u101a\u103a\u104b&nbsp;<\/p>\n\n\n\n<p>Firewall \u1019\u103e\u102c Hardware Firewall \u1014\u103e\u1004\u1037\u103a Software Firewall \u1006\u102d\u102f\u1015\u103c\u102e\u1038(\u1042)\u1019\u103b\u102d\u102f\u1038\u101b\u103e\u102d\u1015\u102b\u1010\u101a\u103a\u104b Firewall \u1000\u102d\u102f \u1000\u103b\u103d\u1014\u103a\u1010\u1031\u102c\u103a\u1010\u102d\u102f\u1037\u1010\u1005\u103a\u1010\u103d\u1031 \u1018\u101a\u103a\u101c\u102d\u102f\u1014\u1031\u101b\u102c\u1019\u103b\u102d\u102f\u1038\u1019\u103e\u102c \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u101e\u1004\u1037\u103a\u101e\u101c\u1032\u1006\u102d\u102f\u101b\u1004\u103a \u1019\u102d\u1019\u102d\u101b\u1032\u1037 Internal Network \u1016\u103c\u1005\u103a\u1010\u1032\u1037 Private Network \u1014\u103e\u1004\u1037\u103a External Network \u1016\u103c\u1005\u103a\u1010\u1032\u1037 Public Network \u1014\u1032\u1037\u1001\u103b\u102d\u1010\u103a\u1006\u1000\u103a\u1010\u1031\u102c\u1037\u1019\u101a\u103a\u1006\u102d\u102f\u101b\u1004\u103a \u1019\u102d\u1019\u102d\u101b\u1032\u1037 Private Network \u1014\u103e\u1004\u1037\u103a Public Network \u1014\u103e\u1005\u103a\u1001\u102f\u101b\u1032\u1037\u1000\u103c\u102c\u1038\u1010\u103d\u1004\u103a Firewall \u1000\u102d\u102f \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u101e\u1004\u1037\u103a\u1015\u102b\u1010\u101a\u103a\u104b Firewall \u1021\u101c\u102f\u1015\u103a\u101c\u102f\u1015\u103a\u1010\u1032\u1037\u1015\u102f\u1036\u1005\u1036\u1000\u1010\u1031\u102c\u1037 Allow \u1014\u103e\u1004\u1037\u103a Deny\u1006\u102d\u102f\u1010\u1032\u1037 \u1015\u102f\u1036\u1005\u1036(\u1042)\u1019\u103b\u102d\u102f\u1038\u1011\u1032\u1014\u1032\u1037\u1015\u1032 \u1021\u101c\u102f\u1015\u103a\u101c\u102f\u1015\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n\n\n\n<p>Firewall \u101b\u1032\u1037\u1021\u1019\u103b\u102d\u102f\u1038\u1021\u1005\u102c\u1038\u1000\u102d\u102f (\u1044)\u1019\u103b\u102d\u102f\u1038\u1001\u103d\u1032\u1001\u103c\u102c\u1038\u1011\u102c\u1038\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n\n\n\n<p>1. Packet Filter Firewall<\/p>\n\n\n\n<p>2. Circuit Filter Firewall<\/p>\n\n\n\n<p>3. Application Filter Firewall<\/p>\n\n\n\n<p>4. State-Full Filter Firewall \u1010\u102d\u102f\u1037 \u1016\u103c\u1005\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n\n\n\n<p>Firewall Layer \u1021\u101c\u102d\u102f\u1000\u103a \u1021\u101c\u102f\u1015\u103a\u101c\u102f\u1015\u103a\u1010\u1032\u1037\u1015\u102f\u1036\u1005\u1036\u1015\u1031\u102b\u103a \u1019\u1030\u1010\u100a\u103a\u1015\u103c\u102e\u1038\u1010\u1031\u102c\u1037 Firewall \u1021\u1019\u103b\u102d\u102f\u1038\u1021\u1005\u102c\u1038\u1010\u103d\u1031 \u1000\u103d\u1032\u1015\u103c\u102c\u1038\u101e\u103d\u102c\u1038\u101b\u1001\u103c\u1004\u103a\u1038\u1015\u1032 \u1016\u103c\u1005\u103a\u1015\u102b\u1010\u101a\u103a\u104b&nbsp; \u1021\u1032\u1012\u102e Firewall \u1021\u1019\u103b\u102d\u102f\u1038\u1021\u1005\u102c\u1038(\u1044)\u1019\u103b\u102d\u102f\u1038 \u1021\u101c\u102f\u1015\u103a\u101c\u102f\u1015\u103a\u1010\u1032\u1037\u1015\u102f\u1036\u1005\u1036\u1000\u102d\u102f \u1015\u103c\u1031\u102c\u1015\u103c\u1015\u1031\u1038\u1015\u102b\u1019\u101a\u103a\u104b<\/p>\n\n\n\n<p>&#8211; Packet Filter Firewall&nbsp;<\/p>\n\n\n\n<p>Packet Filter Firewall \u1021\u101c\u102f\u1015\u103a\u101c\u102f\u1015\u103a\u1010\u1032\u1037 \u1015\u102f\u1036\u1005\u1036\u1000\u1010\u1031\u102c\u1037 IP Packet \u1010\u103d\u1031\u101b\u1032\u1037 Source Address \u1014\u1032\u1037 Destination Address \u1010\u103d\u1031\u1000\u102d\u102f \u1005\u1005\u103a\u1006\u1031\u1038\u1010\u101a\u103a\u104b Firewall \u1005\u1005\u103a\u1006\u1031\u1038\u1010\u1032\u1037\u1015\u102f\u1036\u1005\u1036\u1000 \u1019\u102d\u1019\u102d\u101b\u1032\u1037 ACL (Access Control List) \u1015\u1031\u102b\u103a \u1019\u1030\u1010\u100a\u103a\u1015\u103c\u102e\u1038 \u1005\u1005\u103a\u1006\u1031\u1038\u1015\u102b\u1010\u101a\u103a\u104b Source Address \u1014\u1032\u1037 Destination Address \u101e\u100a\u103a \u1019\u102d\u1019\u102d\u101b\u1032\u1037 Rule \u1014\u1032\u1037 \u1000\u102d\u102f\u1000\u103a\u100a\u102e\u1019\u103e\u102f \u101b\u103e\u102d\u1010\u101a\u103a\u1006\u102d\u102f\u101b\u1004\u103a Allow \u101c\u102f\u1015\u103a\u1001\u103d\u1004\u1037\u103a\u1015\u1031\u1038\u1015\u103c\u102e\u1038 \u1019\u102d\u1019\u102d\u101b\u1032\u1037 Rule \u1014\u1032\u1037 \u1000\u102d\u102f\u1000\u103a\u100a\u102e\u1019\u103e\u102f \u1019\u101b\u103e\u102d\u101b\u1004\u103a\u1010\u1031\u102c\u1037 Deny \u101c\u102f\u1015\u103a\u1015\u1005\u103a\u101c\u102d\u102f\u1000\u103a\u1015\u102b\u1010\u101a\u103a\u104b Packet Filter Firewall \u101e\u100a\u103a Layer \u1010\u103d\u1031\u1011\u1032\u1019\u103e Network Layer \u1019\u103e\u102c \u1021\u101c\u102f\u1015\u103a\u101c\u102f\u1015\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n\n\n\n<p>&#8211; Circuit Filter Firewall&nbsp;<\/p>\n\n\n\n<p>Circuit Filter Firewall \u1021\u101c\u102f\u1015\u103a\u101c\u102f\u1015\u103a\u1010\u1032\u1037 \u1015\u102f\u1036\u1005\u1036\u1000\u1010\u1031\u102c\u1037 Packet \u1010\u103d\u1031\u1000\u102d\u102f \u1005\u1005\u103a\u1006\u1031\u1038\u1015\u102b\u1010\u101a\u103a\u104b \u1005\u1005\u103a\u1006\u1031\u1038\u1010\u1032\u1037\u1014\u1031\u101b\u102c\u1019\u103e\u102c \u1019\u102d\u1019\u102d\u101b\u1032\u1037 ACL (Access Control List) \u1015\u1031\u102b\u103a \u1019\u1030\u1010\u100a\u103a\u1015\u103c\u102e\u1038 \u1005\u1005\u103a\u1006\u1031\u1038\u1015\u102b\u1010\u101a\u103a\u104b \u1019\u102d\u1019\u102d \u101b\u1032\u1037 Rule \u1014\u1032\u1037 \u1000\u102d\u102f\u1000\u103a\u100a\u102e\u1019\u103e\u102f\u101b\u103e\u102d\u1010\u1032\u1037 Pocket \u1000\u102d\u102f Allow \u101c\u102f\u1015\u103a\u1001\u103d\u1004\u1037\u103a\u1015\u1031\u1038\u1015\u103c\u102e\u1038 \u1019\u102d\u1019\u102d\u101b\u1032\u1037 Rule \u1014\u1032\u1037 \u1000\u102d\u102f\u1000\u103a\u100a\u102e\u1019\u103e\u102f\u1019\u101b\u103e\u102d\u1010\u1032\u1037 Pocket \u1000\u102d\u102f\u1010\u1031\u102c\u1037 Disallow \u101c\u102f\u1015\u103a\u1015\u1005\u103a\u101c\u102d\u102f\u1000\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n\n\n\n<p>Circuit Filter Firewall \u101e\u100a\u103a Layer \u1010\u103d\u1031 \u1011\u1032\u1000 Transport Layer \u1019\u103e\u102c \u1021\u101c\u102f\u1015\u103a\u101c\u102f\u1015\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n\n\n\n<p>&#8211; Application Filter Firewall<\/p>\n\n\n\n<p>Application Filter Firewall \u1021\u101c\u102f\u1015\u103a\u101c\u102f\u1015\u103a\u1010\u1032\u1037\u1015\u102f\u1036\u1005\u1036\u1000\u1010\u1031\u102c\u1037 Application Service \u1010\u103d\u1031\u1000\u102d\u102f \u1005\u1005\u103a\u1006\u1031\u1038\u1015\u102b\u1010\u101a\u103a\u104b \u1005\u1005\u103a\u1006\u1031\u1038\u1010\u1032\u1037\u1014\u1031\u101b\u102c\u1019\u103e\u102c \u1019\u102d\u1019\u102d\u101b\u1032\u1037 ACL \u1015\u1031\u102b\u103a \u1019\u1030\u1010\u100a\u103a\u1015\u103c\u102e\u1038 \u1005\u1005\u103a\u1006\u1031\u1038\u1015\u1031\u1038\u1015\u102b\u1010\u101a\u103a\u104b \u1019\u102d\u1019\u102d Rule \u1014\u1032\u1037 \u1000\u102d\u102f\u1000\u103a\u100a\u102e\u1019\u103e\u102f\u101b\u103e\u102d\u1010\u1032\u1037 Application Service \u1010\u103d\u1031\u1000\u102d\u102f Allow \u101c\u102f\u1015\u103a\u1001\u103d\u1004\u1037\u103a\u1015\u1031\u1038\u1015\u103c\u102e\u1038 \u1019\u102d\u1019\u102d\u101b\u1032\u1037 Rule \u1014\u1032\u1037 \u1000\u102d\u102f\u1000\u103a\u100a\u102e\u1019\u103e\u102f\u1019\u101b\u103e\u102d\u1010\u1032\u1037 Application Service \u1010\u103d\u1031\u1000\u102d\u102f\u1010\u1031\u102c\u1037 Disallow \u101c\u102f\u1015\u103a\u1015\u1005\u103a\u101c\u102d\u102f\u1000\u103a\u1015\u102b\u1010\u101a\u103a\u104b Application Filter Firewall \u101e\u100a\u103a OSI Sever Layer \u1011\u1032\u1000 Application Layer \u1019\u103e\u102c \u1021\u101c\u102f\u1015\u103a\u101c\u102f\u1015\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n\n\n\n<p>State-Full Multilayer Filter Firewall&nbsp;<\/p>\n\n\n\n<p>State-Full Filter Firewall \u1006\u102d\u102f\u1010\u102c\u1000\u1010\u1031\u102c\u1037&#8212; Pocket Filter Firewall, Circuit Filter Firewall \u1014\u103e\u1004\u1037\u103a Application Filter Firewall (\u1043)\u1001\u102f\u1000\u102d\u102f \u1015\u1031\u102b\u1004\u103a\u1038\u1005\u1015\u103a\u1011\u102c\u1038\u1010\u1032\u1037 Firewall \u1000\u103c\u102e\u1038 \u1010\u1005\u103a\u1001\u102f \u1016\u103c\u1005\u103a\u1015\u102b\u1010\u101a\u103a\u104b \u104e\u1004\u103a\u1038 State-Full Filter Firewall \u101e\u100a\u103a \u1019\u102d\u1019\u102d\u101b\u1032\u1037 ACL \u1015\u1031\u102b\u103a \u1019\u1030\u1010\u100a\u103a\u1015\u103c\u102e\u1038 Allow \u101c\u102f\u1015\u103a\u1001\u103d\u1004\u1037\u103a\u1015\u1031\u1038\u1011\u102c\u1038\u1010\u1032\u1037 Application Service, Packet \u1014\u103e\u1004\u1037\u103a Source Address, Destination Address \u1010\u102d\u102f\u1037\u1000\u102d\u102f Allow \u101c\u102f\u1015\u103a\u1001\u103d\u1004\u1037\u103a\u1015\u1031\u1038\u1015\u103c\u102e\u1038 \u1019\u102d\u1019\u102d\u101b\u1032\u1037 Rule \u1014\u1032\u1037 \u1019\u1000\u102d\u102f\u1000\u103a\u100a\u102e\u1010\u1032\u1037\u1021\u101b\u102c\u1010\u103d\u1031 \u1021\u102c\u1038\u101c\u102f\u1036\u1038\u1000\u102d\u102f\u1010\u1031\u102c\u1037 Deny \u101c\u102f\u1015\u103a\u1015\u1005\u103a\u101c\u102d\u102f\u1000\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n\n\n\n<p>\u101a\u1001\u102f \u1001\u1031\u1010\u103a Firewall \u1010\u103d\u1031 \u1019\u103e\u102c \u1006\u102d\u102f\u101b\u1004\u103a \u1015\u102d\u102f \u1015\u103c\u102e\u1038 \u1021\u1006\u1004\u1037\u103a\u1019\u103c\u1004\u1037\u103a \u1010\u1032\u1037Security Control \u1015\u102d\u102f\u1004\u103a\u1038\u1006\u102d\u102f\u1004\u103a\u101b\u102c\u1010\u103d\u1031 \u1015\u102d\u102f\u1019\u102d\u102f \u1015\u102b\u101d\u1004\u103a\u101c\u102c\u1015\u103c\u102e\u1038\u104b<\/p>\n\n\n\n<p>NGFW(Next-Generation Firewall)\u1010\u103d\u1031\u1021\u1016\u103c\u1005\u103a \u1010\u103d\u1031\u1037\u1019\u103c\u1004\u103a \u101c\u102c\u101b\u1019\u103e\u102c \u1016\u103c\u1005\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Firewall \u1006\u102d\u102f\u1010\u102c\u1000 \u1000\u103b\u103d\u1014\u103a\u1010\u1031\u102c\u103a \u1010\u102d\u102f\u1037\u1010\u103d\u1031\u101b\u1032\u1037 organization \u1019\u103e\u102c Computer \u1019\u103b\u102c\u1038\u101e\u100a\u103a \u1010\u1005\u103a\u101c\u102f\u1036\u1038\u1014\u103e\u1004\u1037\u103a\u1010\u1005\u103a\u101c\u102f\u1036\u1038 \u1021\u1015\u103c\u1014\u103a\u1021\u101c\u103e\u1014\u103a Network \u1001\u103b\u102d\u1010\u103a\u1006\u1000\u103a\u1011\u102c\u1038\u1015\u103c\u102e\u1038 \u1000\u103b\u103d\u1014\u103a\u1010\u1031\u102c\u103a\u1010\u102d\u102f\u1037\u101b\u1032\u1037\u1021\u101b\u1031\u1038\u1000\u103c\u102e\u1038\u1010\u1032\u1037 Data \u1019\u103b\u102c\u1038\u1000\u102d\u102f Network \u1015\u1031\u102b\u103a\u1000\u1014\u1031\u1010\u1005\u103a\u1006\u1004\u1037\u103a \u101c\u1000\u103a\u1001\u1036\u1010\u1032\u1037\u1014\u1031\u101b\u102c\u1019\u103e\u102c Hacker,Attacker, \u1014\u103e\u1004\u1037\u103a<\/p>\n","protected":false},"author":1,"featured_media":21331,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Types of Firewall - Legend Myanmar Technology<\/title>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lmtech.asia\/lmt\/types-of-firewall-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Types of Firewall - Legend Myanmar Technology\" \/>\n<meta property=\"og:description\" content=\"Firewall \u1006\u102d\u102f\u1010\u102c\u1000 \u1000\u103b\u103d\u1014\u103a\u1010\u1031\u102c\u103a \u1010\u102d\u102f\u1037\u1010\u103d\u1031\u101b\u1032\u1037 organization \u1019\u103e\u102c Computer \u1019\u103b\u102c\u1038\u101e\u100a\u103a \u1010\u1005\u103a\u101c\u102f\u1036\u1038\u1014\u103e\u1004\u1037\u103a\u1010\u1005\u103a\u101c\u102f\u1036\u1038 \u1021\u1015\u103c\u1014\u103a\u1021\u101c\u103e\u1014\u103a Network \u1001\u103b\u102d\u1010\u103a\u1006\u1000\u103a\u1011\u102c\u1038\u1015\u103c\u102e\u1038 \u1000\u103b\u103d\u1014\u103a\u1010\u1031\u102c\u103a\u1010\u102d\u102f\u1037\u101b\u1032\u1037\u1021\u101b\u1031\u1038\u1000\u103c\u102e\u1038\u1010\u1032\u1037 Data \u1019\u103b\u102c\u1038\u1000\u102d\u102f Network \u1015\u1031\u102b\u103a\u1000\u1014\u1031\u1010\u1005\u103a\u1006\u1004\u1037\u103a \u101c\u1000\u103a\u1001\u1036\u1010\u1032\u1037\u1014\u1031\u101b\u102c\u1019\u103e\u102c Hacker,Attacker, \u1014\u103e\u1004\u1037\u103a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lmtech.asia\/lmt\/types-of-firewall-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Legend Myanmar Technology\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-20T10:03:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-25T09:05:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lmtech.asia\/lmt\/wp-content\/uploads\/2021\/01\/pre-size2-1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lmtech.asia\/lmt\/#website\",\"url\":\"https:\/\/lmtech.asia\/lmt\/\",\"name\":\"Legend Myanmar Technology\",\"description\":\"LMT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/lmtech.asia\/lmt\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lmtech.asia\/lmt\/types-of-firewall-2\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/lmtech.asia\/lmt\/wp-content\/uploads\/2021\/01\/pre-size2-1-scaled.jpg\",\"width\":2560,\"height\":1440},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lmtech.asia\/lmt\/types-of-firewall-2\/#webpage\",\"url\":\"https:\/\/lmtech.asia\/lmt\/types-of-firewall-2\/\",\"name\":\"Types of Firewall - Legend Myanmar Technology\",\"isPartOf\":{\"@id\":\"https:\/\/lmtech.asia\/lmt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lmtech.asia\/lmt\/types-of-firewall-2\/#primaryimage\"},\"datePublished\":\"2021-01-20T10:03:10+00:00\",\"dateModified\":\"2021-01-25T09:05:29+00:00\",\"author\":{\"@id\":\"https:\/\/lmtech.asia\/lmt\/#\/schema\/person\/72cc066d8da28fb4d7b43f30d17971ad\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lmtech.asia\/lmt\/types-of-firewall-2\/\"]}]},{\"@type\":[\"Person\"],\"@id\":\"https:\/\/lmtech.asia\/lmt\/#\/schema\/person\/72cc066d8da28fb4d7b43f30d17971ad\",\"name\":\"legend\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lmtech.asia\/lmt\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/62dbac6f3bf15f4bac338d34b62deb21?s=96&d=mm&r=g\",\"caption\":\"legend\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/posts\/21325"}],"collection":[{"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/comments?post=21325"}],"version-history":[{"count":2,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/posts\/21325\/revisions"}],"predecessor-version":[{"id":21340,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/posts\/21325\/revisions\/21340"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/media\/21331"}],"wp:attachment":[{"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/media?parent=21325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/categories?post=21325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmtech.asia\/lmt\/wp-json\/wp\/v2\/tags?post=21325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}