You are on page 1of 1

Aniket Mahule COMPUTER NETWORKS CS18004

CREATIVE ASSIGNMENT
TYPES OF COMPUTER NETWORK FIREWALLS
Software Firewalls Hardware Firewalls Packet-Filtering Firewalls Circuit-Level Gateways
A software firewall is installed on the host device. As the name suggests, hardware firewalls are security When it comes to types of firewalls based on their method Circuit-level gateways are a type of firewall that work at
Accordingly, this type of firewall is also known as a Host devices that represent a separate piece of hardware placed of operation, the most basic type is the packet-filtering the session layer of the OSI model, observing TCP
Firewall. Since it is attached to a specific device, it has to between an internal and external network (the Internet). firewall. It serves as an inline security checkpoint attached
(Transmission Control Protocol) connections and sessions.
to a router or switch. As the name suggests, it
utilize its resources to work. Therefore, it is inevitable for it This type is also known as an Appliance Firewall. Their primary function is to ensure the established
monitors network traffic by filtering incoming packets
to use up some of the system’s RAM and CPU. Unlike a software firewall, a hardware firewall has its according to the information they carry. connections are safe.
If there are multiple devices, you need to install the resources and doesn’t consume any CPU or RAM from the As explained above, each data packet consists of a header In most cases, circuit-level firewalls are built into some
software on each device. Since it needs to be compatible host devices. It is a physical appliance that serves as a and the data it transmits. This type of firewall decides type of software or an already existing firewall.
with the host, it requires individual configuration for each. gateway for traffic passing to and from an internal network. whether a packet is allowed or denied access based on the Like pocket-filtering firewalls, they don’t inspect the actual
Hence, the main disadvantage is the time and knowledge header information. To do so, it inspects the protocol, data but rather the information about the transaction.
needed to administrate and manage firewalls for each source IP address, destination IP, source port, and
Additionally, circuit-level gateways are practical, simple to
destination port. Depending on how the numbers match the
device. set up, and don’t require a separate proxy server.
access control list (rules defining wanted/unwanted traffic),
On the other hand, the advantage of software firewalls is the packets are passed on or dropped.
that they can distinguish between programs while filtering
incoming and outgoing traffic. Hence, they can deny access
to one program while allowing access to another.

Stateful Inspection Firewalls Proxy Firewalls Next-Generation Firewalls Cloud Firewalls


A stateful inspection firewall keeps track of the state of a A proxy firewall serves as an intermediate device between The next-generation firewall is a security device that A cloud firewall or firewall-as-a-service (Faas) is a cloud
connection by monitoring the TCP 3-way handshake. This internal and external systems communicating over the combines a number of functions of other firewalls. It solution for network protection. Like other cloud solutions,
allows it to keep track of the entire connection – from start Internet. It protects a network by forwarding requests from incorporates packet, stateful, and deep packet inspection. it is maintained and run on the Internet by third-party
to end – permitting only expected return traffic inbound. the original client and masking it as its own. Proxy means Simply put, NGFW checks the actual payload of the packet vendors.
When starting a connection and requesting data, the stateful to serve as a substitute and, accordingly, that is the role it instead of focusing solely on header information. Clients often utilize cloud firewalls as proxy servers, but
inspection builds a database (state table) and stores the plays. It substitutes for the client that is sending the request. Unlike traditional firewalls, the next-gen firewall inspects the configuration can vary according to the demand. Their
connection information. In the state table, it notes the the entire transaction of data, including the TCP main advantage is scalability. They are independent of
source IP, source port, destination IP, and destination port handshakes, surface-level, and deep packet inspection. physical resources, which allows scaling the firewall
for each connection. Using the stateful inspection method, Using NGFW is adequate protection from malware attacks, capacity according to the traffic load.
it dynamically creates firewall rules to allow anticipated external threats, and intrusion. These devices are quite Businesses use this solution to protect an internal network
traffic. flexible, and there is no clear-cut definition of the or other cloud infrastructures (Iaas/Paas).
functionalities they offer. Therefore, make sure to explore
what each specific option provides.

You might also like