Network firewall
From Computing and Software Wiki
(Initialize/Create page structure) |
(re-write introductions) |
||
Line 1: | Line 1: | ||
- | to | + | [[Image:Example.jpg|right|thumb]] |
+ | '''Network Firewall''' is now considered as a first line of defense in the form of a barrier against outside attacks, which is installed on computers connect to internet. In general Firewall prevents the dangers of Internet from spreading to your internal network. It more like a moat of a medieval castle that a firewall in a modern building. It serves multiple purposes [1:21]: | ||
+ | * It restricts people to entering at a carefully controlled point. | ||
+ | * It prevents attackers from getting close to your other defenses. | ||
+ | * It restricts people to leaving at a carefully controlled point. | ||
+ | [1:21] | ||
+ | In practice,a firewall is a collection of hosts, routers, and other hardware that designed to prevent unauthorized electronic access between two parts of a network. It is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria.[3] | ||
+ | |||
+ | Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.[3] | ||
== History== | == History== | ||
===What is Firewall=== | ===What is Firewall=== | ||
Line 14: | Line 22: | ||
===Screened host=== | ===Screened host=== | ||
===Screened subnet=== | ===Screened subnet=== | ||
+ | ==Firewall Software== | ||
==References== | ==References== | ||
+ | # Elizabeth D. Zwicky, Simon Cooper, and D. Brent Chapman;''Building internet Firewalls, Second Edition''; Published by O'Reilly & Associates, Inc. @2000; ISBN:1-56592-871-7, McMaster Thode Library: TK 5105.59.Z85 2000 | ||
+ | # John R. Vacca, Scott R. Ellis; ''Firewalls, Jumpstart for Network and Systems Administrators''; Elsevier digital press @2005; ISBN: 1-55558-297-4, McMaster Thode Library: TK 5105.59.V32 2005 | ||
+ | # [http://en.wikipedia.org/wiki/Network_firewall#Network_layer_and_packet_filters Firewall], Wikipedia, Accessed on April 3rd 2009 21:35. | ||
==See also== | ==See also== | ||
==External links== | ==External links== | ||
+ | [http://www.cisco.com/web/about/ac123/ac147/ac174/ac200/about_cisco_ipj_archive_article09186a00800c85ae.html Firewalls and Internet Security] by Frederic Avolio, Avolio Consulting, Cisco Systems. | ||
+ | ==Time-stamped Signature== | ||
--[[User:Fulx|Fulx]] 19:05, 4 April 2009 (EDT) | --[[User:Fulx|Fulx]] 19:05, 4 April 2009 (EDT) |
Revision as of 01:54, 5 April 2009
Network Firewall is now considered as a first line of defense in the form of a barrier against outside attacks, which is installed on computers connect to internet. In general Firewall prevents the dangers of Internet from spreading to your internal network. It more like a moat of a medieval castle that a firewall in a modern building. It serves multiple purposes [1:21]:
- It restricts people to entering at a carefully controlled point.
- It prevents attackers from getting close to your other defenses.
- It restricts people to leaving at a carefully controlled point.
[1:21]
In practice,a firewall is a collection of hosts, routers, and other hardware that designed to prevent unauthorized electronic access between two parts of a network. It is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria.[3]
Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.[3]
Contents |
History
What is Firewall
Why Firewall
Benefits of Firewall
Limitations of Firewall
Firewall Types
Simple packet filtering: IP or filtering Firewall
Application Firewalls: proxy servers
Stateful multilayer-inspection Firewalls
Firewall Architectures
Single-Box
Screened host
Screened subnet
Firewall Software
References
- Elizabeth D. Zwicky, Simon Cooper, and D. Brent Chapman;Building internet Firewalls, Second Edition; Published by O'Reilly & Associates, Inc. @2000; ISBN:1-56592-871-7, McMaster Thode Library: TK 5105.59.Z85 2000
- John R. Vacca, Scott R. Ellis; Firewalls, Jumpstart for Network and Systems Administrators; Elsevier digital press @2005; ISBN: 1-55558-297-4, McMaster Thode Library: TK 5105.59.V32 2005
- Firewall, Wikipedia, Accessed on April 3rd 2009 21:35.
See also
External links
Firewalls and Internet Security by Frederic Avolio, Avolio Consulting, Cisco Systems.
Time-stamped Signature
--Fulx 19:05, 4 April 2009 (EDT)