Firewalls are network security systems that monitor and control incoming and outgoing network traffic to establish a barrier between trusted internal networks and untrusted external networks. There are different types of firewalls including packet-filtering firewalls, stateful inspection firewalls, circuit-level gateways, and application-level gateways. Each type varies in how they inspect network traffic and what level of the communication stack they operate on.
Firewalls are network security systems that monitor and control incoming and outgoing network traffic to establish a barrier between trusted internal networks and untrusted external networks. There are different types of firewalls including packet-filtering firewalls, stateful inspection firewalls, circuit-level gateways, and application-level gateways. Each type varies in how they inspect network traffic and what level of the communication stack they operate on.
Firewalls are network security systems that monitor and control incoming and outgoing network traffic to establish a barrier between trusted internal networks and untrusted external networks. There are different types of firewalls including packet-filtering firewalls, stateful inspection firewalls, circuit-level gateways, and application-level gateways. Each type varies in how they inspect network traffic and what level of the communication stack they operate on.
ROLL NO: 16 FIREWALL • It is network security system that • Monitors incoming and outgoing network • Controls incoming and outgoing network • It establishes a barrier between a trusted internal network and untrusted external network. • They are an integral part of a comprehensive security framework for network
An illustration of where a firewall
would be located in a network Functionalities of a firewall • Prevents unauthorized access to and from a private network • Firewalls are tools that can be used to enhance the security of computers connected to a network • It absolutely isolates the computer from internet • Using a “wall of code” • That inspects each individual data packet as it arrives at the either side of the firewall – inbound or outbound from the computer • To determine whether it should be allowed to pass or to be blocked CATEGORIES OF FIREWALLS 1. Network based firewall 1. Are positioned on the gateway computers of LANs, WANs 2. They are either software appliances running on general purpose hardware or hardware base firewall computer appliances 2. Host based firewall 1. Positioned on the network node itself and control network traffic in and out of those machines TYPES OF FIREWALLS 1. Packet-filtering firewalls 2. Stateful inspection firewalls 3. Circuit-level gateways(proxy firewalls) 4. Application-level gateways PACKET-FILTERING FIREWALLS • Most basic and oldest type of firewall architecture • It creates a checkpoint at a traffic router or switch • Performs simple check on the packets coming through the router • Inspecting information such as destination and originating IP address, port number, and other surface level information • If the information packet doesn’t pass the inspection • It is dropped CIRCUIT-LEVEL GATEWAYS • It quickly and easily approve or deny traffic without consuming significant computing resources • Works by verifying the transmission control protocol(TCP) handshake • TCP handshake check is designed to make sure that the session the packet is from is legitimate • Does not check the packet itself • If the packet had malware but had the right TCP handshake-it would pass right through STATEFUL INSPECTION FIREWALLS • Combines both packet inspection and TCP handshake verification • To create a level of protection greater than either two architectures could provide alone • Puts more strain on the computing resources • Slow down the transfer of legitimate packets PROXY FIREWALLS (APPLICATION-LEVEL GATEWAYS) • Operates at the application layer to filter incoming traffic between the network and the traffic source • Rather than letting traffic connect directly • Proxy firewall first establishes a connection to the source and inspects the incoming data packet • Check is similar to the stateful inspection firewall • Proxy firewalls may also perform deep-layer packet inspections • Checking the actual content of the packet to verify that it contains no malware • Once check is complete and the packet is approved to connect to the destination, the proxy sends it off • This creates an extra layer of separation between the client and the individual devices on the network • Drawback is that they can create significant slowdown because of the extra steps in the data packet transferal process BIBLIOGRAPHY • https://personalfirewall.comodo.com/what-is-firewall.html • https://www.cisco.com/c/en_in/products/security/firewalls/what-is- a-firewall.html • https://en.wikipedia.org/wiki/Firewall_(computing)#Types • https://www.compuquip.com/blog/the-different-types-of-firewall- architectures