Friday 14 June 2013

Firewall

Firewall is a set of related programs and located at a network gateway server that protects the resources of a private network from users from other networks. An enterprise with an intranet that allows its workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to and share.

Basically, a firewall, working closely with a router program and examines each network packet to determine whether to forward it toward its destination. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation(network) users. Firewall is often installed in a specially designated computer separate from the rest of the network so that no incoming request can get directly at private network resources  but not public network.

There are number of firewall screening methods and simple one is to screen requests to make sure they come from acceptable (previously identified) domain name and Internet Protocol addresses. For mobile users, firewalls allow remote access in to the private network by the use of secure logon procedures and authentication certificates etc.

Many companies make firewall products. Features include logging and reporting, automatic alarms at given thresholds of attack and a graphical user interface for controlling the firewall.

In addition to port and IP address rules, firewalls can have a wide variety of functionality which is work out. They can also act as caching servers, VPNs, routers and many more. Some examples of hardware firewalls are CheckPoint, Cisco PIX, SonicWall, Contivity from Nortel, and Linksys (for the home market).

Firewalls are vital to network management and without this control over computer and network access, large networks could not store the sensitive data intended for selective retrieval. Firewalls are also very important for home broadband users, without a home version of one of these products, your personal data is the biggest risk for that.

No comments:

Post a Comment