What is firewall ?

Firewall is a software and hardware ,it is protect our system to the malware,virus, and malicious software ,which is come in to the system with the help of pen-drive or downloaded file .
A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. The rule is two type outbound and inbound .It's defined by the user.firewall only protect to incoming services . A firewall controls access to the resources of a network through a positive control model. This means that the only traffic allowed onto the network is defined in the firewall policy; all other traffic is denied.
Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.
Types of Firewall:- The National Institute of Standards and Technology (NIST) 800-10 divides firewalls into four basic types:
- Packet filters firewall
- Application gateway
- Circuit-level gateway
- Proxy server firewall
Describe one-by-one types of firewall :--
- Packet filter firewall:--
This involve looking at each packet entering or leaving the network and accepts or reject it on the basis of user define rule. Packet filtering is fairly effective and transparent user, but it is difficult to configure . it is able to IP spoofing.IP spoofing is technique used to gain unauthorized access to computer , whereby the intruder send massage to a computer with an IP address indicate the massage is coming from a trusted host. To engage in IP spoofing , a hacker must first use a variety of technique to find an IP address of a trusted host .Never router and firewall arrangement can offer protection against IP spoofing .
2. Application gateway:-
This applise security mechanism to specific application, such as file transfer protocol (FTP),and telnet servers.This is very effective but can impose performance degradation .
3. Circuit-level gateway:-
With this ,security mechanism are applised when a TCP and UDP connection is established once the connection has been made ,packet can flow between the host without further checking .
4. Proxy server :-
this is used to entercept all massage entering and leaving the network the proxy server effectively hides the true network address .most organisation have made this mandatory vide their security policy in interest of information system protection for the user/employees.
Comments
Post a Comment
thank you for visiting :)