You are on page 1of 1



A stand – alone machine is of no significance in the modern world. It gains value only

when connected in a network. To quote an instance, a large number of confidential transactions

occur every second in a network. Hence network security is needed to prevent hacking of data and

to provide authenticated data transfer. Network security can be achieved by installing a firewall.

Conventional firewalls rely on the notions of restricted topology and controlled entry points to

function. There is difficulty in filtering certain protocols, restricting network topology, end-to-end

encryption problems and few more setbacks in using firewalls. Hence there arises a need to use

Distributed firewalls which gives complete security to the network.

Distributed firewalls are host-resident security software applications that protect the

end-user machines and the enterprise’s network servers against unwanted intrusion. Its advantage is

filtering traffic from the internet and the internal network. This includes, preventing hacking attacks

that originate from both internet and the internal network. This is essential as the worst, costly and

destructive damages often originate from within the organisation.

Distributed firewalls secure the network by protecting critical network endpoints, exactly

where hackers are likely to penetrate. They also overcome the single point-of-failure problem posed

by the firewall.

In our paper, we deal with distributed firewall concepts, its components, evolution, policies

and a sample of the designed policy along with implementation.