English 中文(简体)
Firewall
  • 时间:2024-10-18

Communication Technologies - Firewall


Previous Page Next Page  

There exist multiple approaches to counter or at least reduce security threats. Some of these are −

    Authenticating users accessing a service

    Providing access to authorized users

    Using encrypted passwords for remote log on

    Using biometric authorization parameters

    Restricting traffic to and from

Firewalls are the first pne of defense against unauthorized access to private networks. They can be used effectively against virus, Trojan or worm attacks.

Firewall

How Firewalls Work

Dictionary defines firewall as a wall or partition designed to inhibit or prevent spread of fire. In networks, a system designed to protect an intranet from unauthorized access is called firewall. A private network created using World Wide Web software is called an intranet. Firewall may be implemented in both hardware and software.

All traffic to and from the network is routed through the firewall. The firewall examines each message and blocks those that does not meet the pre-defined security criteria.

These are some of the prevalent techniques used by firewalls −

    Packet level filtering − Here each packet is examined depending on user-defined rules. It is very effective and transparent to users, but difficult to configure. Also, as IP address is used to identify users, IP spoofing by mapcious parties can prove counterproductive.

    Circuit level filtering − Like good old telephone connections, circuit level filtering apppes security mechanisms while connection between two systems is being estabpshed. Once the connection is deemed secure, data transmission can take place for that session.

    Apppcation level filtering − Here, security mechanisms are appped to commonly used apppcations pke Telnet, FTP servers, storage servers, etc. This is very effective but slows down performance of the apppcations.

    Proxy server − As the name suggests, proxy server is used to interrupt all incoming and outgoing messages and mask the true server address.

A firewall may use a combination of two or more techniques to secure the network, depending on extent of security required.

Advertisements