Skip to main content

Firewall

What is Firewall?

A firewall is a network security device that monitors and controls incoming and outgoing devices based on the defined set of security rules. The purpose of a firewall is to establish a barrier between a trusted internal network and an untrusted external network (such as the internet) in order to block malicious traffic like viruses and hackers. Therefore the firewall can be hardware, software or cloud-based which monitor and control all outgoing and incoming traffic, each type of firewall having its own defined set of security rules based on this it accepts, rejects or drops that specific traffic.

Firewall Process

Types of Firewall Category

Network Firewall - Filter traffic between two or more networks and run on network hardware
Host based Firewall - Run on host computers and control network traffic in and out of those machines.

Firewall Task

  • Defend resources
  • Validate access
  • Manage and control network traffic
  • Record and report on events
  • Act as an intermediary

Types of Firewall

  • Packet-Filtering Firewalls
  • Next-Generation Firewalls (NGFW) 
  • Proxy Firewalls 
  • Network Address Translation (NAT) Firewalls 
  • Stateful Multilayer Inspection (SMLI) Firewalls 

Packet-Filter or Network Layer

Packet filter firewalls is also called network layer firewalls, to control network access it operates outgoing and incoming packet. Therefore it allows them to pass or stop based on source and destination IP address, protocols, and ports. However, in the OSI model, it mainly uses the first three layers and analyzes traffic at the transport layer protocol. It generally falls into two sub-categories, stateful and stateless. 

Next-Generation Firewalls (NGFW) 

The next-generation firewalls is a traditional firewalls technology, it has additional functionality such as application inspection, deep packet inspection, traffic inspection, SSL/SSH inspection, anti-virus, intrusion prevention systems, etc, which used to stop modern days security breaches like application-layer attacks and advanced malware attacks.

Proxy Firewalls 

A proxy firewalls is the network security system, that filters network traffic at the application layer. It is also called an application firewalls or gateway firewalls. A proxy gateway receives a request from a client inside the firewalls, where it is then evaluate against a set of rules and then sends this request to the remote server outside of the firewalls. Therefore, firewall proxy provides internet access to computers on a network, that filter, cache, control, and log request coming from client to keep the network secure. However, the proxy firewalls monitor traffic for HTTP and FTP protocols.

Network Address Translation (NAT) Firewalls

Network address translation (NAT) firewalls is actually a sorting method of the incoming packet that assures users, that only the request information is receive. Therefore it is similar to a proxy firewalls that they act as an intermediate between a group of computer and outside traffic. In this, by using a single IP address, it allows multiple devices with independent network addresses to connect to the internet, where individual IP addresses are hidden because of this IP addresses can’t be captured by hackers.

Stateful Multilayer Inspection (SMLI) Firewalls 

Stateful multilayer inspection (SMLI) firewalls filter packets at the application, network, and transport layers it uses a sophisticated form of packet filter that examines all the seven layers of the OSI model. It also examines packets to determine the state of the communication to ensure all initiated communication is only taking place with trusted sources. Therefore, each packet is examine and compared against known states of friendly packets.

Generation of Firewall

  • First Generation- Packet Filtering Firewall
  • Second Generation- Stateful Inspection Firewall
  • Third Generation- Application Layer Firewall
  • Next Generation Firewalls (NGFW)
  • Also learn about Network Address Translation (NAT)


Comments

Popular posts from this blog

Virtual Private Network (VPN)

  What is Virtual Private Network (VPN)? A virtual private network (VPN) is a secure connection between two private networks over a public network (in other words, over the Internet). All the data that flows over the VPN is encrypted. So anyone who steals packets from the VPN will find them unintelligible; only the parties on either end of the VPN are able to decrypt the packets. VPN connections are often called tunnels. Because they provide an isolated pathway from one point to another through the Internet. The only way to gain meaningful access to a VPN tunnel is at either end. Example for VPN Connections VPNs are used for There are two common uses for VPNs: To provide remote workers with secure access to your company network: To do that, you set up a VPN on the router, and then provide your remote workers with the credentials necessary to access the VPN. The remote workers can run a software VPN client on their home computers or laptops to connect to

VERSION CONTROL TOOL (SVN)

VERSION CONTROL TOOL In Project development several team members will be available Each developers will be developing some components in project All the developers may not be available in same office/location Q-1) How to integrate all the developers code ? Q-2) How to track changes happening to source code ? For the above two problems, Version Control Tool is the solution Version Control Tool provides Storage Capacity to store our project source code Version Control Tool provides Monitored Access (Who/When/Why/What) There are several version control tools are available in the market ·         SVN (Subversion) ·         GIT HUB ·         Bit Bucket etc…   SVN SVN stands for Subversion SVN is an Opensource software SVN is a version control software SVN follows Centralized Architecture SVN Architecture ·         SVN Server ·         SVN Client SVN Server will be installed in one remote computer SVN Server setup will be taken care by Adminis

Motherboard

What is Motherboard? Motherboard If the processor is the brain of the computer, the motherboard is the heart of the computer. The motherboard is the main circuit board inside the computer and however, all the components and peripherals are attached to it. Therefore the most of the compute features like scalability and upgradeability depend on the motherboard. Computer Motherboard Components Components of Motherboard Key Assessable Parameters of Motherboard Form factor Chipset CPU Memory Audio Ports and Slots Headers and Connectors BIOS Form factor The root mean square value ratio to the average value ratio of the alternating current is called Form Factor and it is the ratio of the root mean square value to the average value is also known as the absolute value of the waveform. Measurements of Form Factor, Form Factor Formula Where RMS is Root Mean Square Value, AV is Average Value Ir.m.s is the root main square value of current, therefore Iav are