FIREWALLS: Explained

FIREWALLS: Explained

A firewall is a system that filters traffic and?information coming in from the internet in a bid?to flag and?stop unauthorized users from accessing a private network. Unwanted traffic is thus blocked by a firewall, while desired or authorized?traffic is allowed.

The goal of a firewall is to erect a security wall between a private network and the public internet since harmful traffic and hackers will always attempt to infiltrate private networks in order to do harm. And the primary network component to stop this is a firewall.

For a large firm with several PCs and servers, a firewall is very crucial. Because you don’t want all those applications, systems and devices to be available to the public online, where a hacker may gain access and completely devastate the organization.

There are many similarities between the operation of a firewall in a building structure and one that is utilized in computer networks. Indeed, that is the origin of the phrase “firewall.” When a fire breaks out?on one side of a building, a firewall acts as a barrier to contain the fire and prevent it from spreading to the other side of the structure.

The firewall’s purpose is to prevent the building from being completely destroyed by a?fire. However, if this firewall hadn’t been installed, the fire would have spread to the opposite side and eventually consumed the entire structure. So, a network firewall and a structure firewall function similarly.

It prevents potentially?malicious activities and applications?from infiltrating a private network and propagating to the other side of the firewall.

A firewall operates by screening incoming network traffic and deciding whether or not to allow it to pass through based on its rules. Another name for these guidelines is an access control list. The network administrator sets these policies, which are modifiable. What can enter a network and what can exit it are both determined by the administrator. Permission is either granted or denied under these guidelines.

For instance, in an access control list, a network administrator can specify which IP addresses can be able to gain access to a network and which ones have been blocked. Blocked IP addresses will be denied access by the firewall until it has been removed from the list of blocked addresses and vice versa.

Apart from IP addresses, a network administrator can use or make rules using other identifiers such as protocols, ports, domain names, programs and keywords.

So let’s take an example where access is restricted by port numbers according to firewall regulations and?assume?that the data using ports 20, 45, and 100 has been granted access to this network and that therefore?the rules have permitted incoming data using those ports. Therefore, any incoming data that uses those ports is able to get past the firewall.

Additionally, the rules in this firewall have prohibited any data from using ports 50 and 2089. Thus, the firewall will prevent access to any incoming data that uses those port numbers, preventing it from passing through.


Types of Firewalls

  • Host-based firewall

There are various varieties of firewalls, one of which is a software firewall known as a host-based firewall. This type of firewall is installed on a computer and it?guards that particular machine only. For example, a host-based firewall is pre-installed on newer Microsoft operating system versions.

  • Third party host-based firewall

There are also third-party host-based firewalls that can be purchased and installed on a computer. One popular third-party host-based firewall is Zone Alarm.

A lot of anti-virus programs also come with built-In host-based firewall capabilities.

  • Network-based firewall

Operating at the network layer, a network-based firewall consists of both hardware and software components. It is situated between the public internet and a private network. However, a network-based firewall safeguards the entire network, as opposed to a host-based firewall, which simply guards that particular computer. And it accomplishes this by implementing management rules throughout the network as a whole, preventing any malicious activity from getting to the network devices.

Large enterprises are the primary users of network-based firewalls, which are also available as standalone products. They may also be installed in a service provider’s cloud infrastructure or as an integrated part of a router, depending on how many smaller businesses use them.

Many organizations will employ firewalls that are both host-based and network-based. To ensure optimal protection, they will deploy host-based firewalls for each computer and server protection in addition to network-based firewalls to safeguard the entire network. Because each computer’s host-based firewall will be able to block hazardous data if it manages to evade the network firewall.

—

Boney Maundu

Tech Contractor & Writer

Slim Bz TechSystems: Nairobi

要查看或添加评论,请登录

Boney Maundu的更多文章

  • Network Ports Explained

    Network Ports Explained

    What exactly is a network port? In this context, ports refer to virtual connections that are utilized by services and…

  • Mobile Telecommunication Generations: 1st to 5th Gen.

    Mobile Telecommunication Generations: 1st to 5th Gen.

    Early in the 20th century, mobile radio telephones were deployed for military communications. In 1946, the first…

  • CYBERWARFARE: Explained

    CYBERWARFARE: Explained

    On February 26, 2022, the world woke up to the news that Anonymous, a hacktivist group and organization that gained…

  • HOW CREDIT CARD FRAUD BY CLONING WORKS

    HOW CREDIT CARD FRAUD BY CLONING WORKS

    The process of replicating a card’s information digitally or physically onto a new card is known as “card cloning.”…

  • What can a hacker do with just an IP address?

    What can a hacker do with just an IP address?

    A device that connects to the internet is usually given a unique identification number known as an IP address or…

  • How to Build a Home Security & Surveillance Plan: Pt.1

    How to Build a Home Security & Surveillance Plan: Pt.1

    When it comes to home security, where precious lives and property are at stake, prior, diligent planning for a home…

  • A Comprehensive Guide to Electronic Locks for Access Control

    A Comprehensive Guide to Electronic Locks for Access Control

    Physical access control systems, which might include turnstiles, commercial door locks, gates, and physical barrier…

  • UNVEILING THE MYSTERIES OF THE DARK WEB

    UNVEILING THE MYSTERIES OF THE DARK WEB

    The dark web may evoke images of drug and gun dealers advertising and selling their wares, or hackers and…

  • The Key to Home Security: Effective Deterrent Measures

    The Key to Home Security: Effective Deterrent Measures

    A case for deterrence Deterring and preventing theft, burglaries, and robberies from happening will always be a better…

  • HOW BILL GATES AND STEVE JOBS ‘STOLE’ FROM XEROX

    HOW BILL GATES AND STEVE JOBS ‘STOLE’ FROM XEROX

    How PARC invented the Graphical User Interface that Microsoft & Apple capitalized on Among the greatest inventions of…

社区洞察

其他会员也浏览了