Skip to main content

FIREWALL

What Is Firewall?


We can use a firewall to protect our home network and family from offensive web sites and potential hackers.Basically,a firewall is barrier to keep destructive forces away from our property.In fact,that is why its called a firewall.Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next.
visit-https://yoursystem.in/firewall/

Firewall may be classified into three different ways:-

  • By their processing type
  • By their evolutionary generation
  • By the way they are implemented

Firewall by processing type:-

  1. Packet-filtering firewall:-

Packet filtering firewall come in three types:

  1. Traffic on a network is broken into packets,smaller message units.Each packet must hold at least two address.that of the sender and that of the recipient.A packet-filtering firewall will hold a database of rules that tells it what to do with packets.often the rules are based on the address mentioned above and the protocol the packet is being sent under.The rules may include all three ideas,
  • The first rule says if packet is from any address on the 172.16.0.0 network(172.16.x.x) and being sent to any address on the 10.10.0.0 network,using any protocol,drop the packet.The X character are used as WILDCARD on some firewall,as the text mention later.Other firewall might use zeros instead,so we need to know the syntax for the fire we are configuring.
  • The second rule says if the packet is from any address on the 192.168.0.0 network(192.168.x.x) and being sent to the specific address 10.10.10.25 (10.10.1.25),using the HTTP protocol,let that packet through.This tells me that 10.10.10.25 is the address of a web server on that network,because HTTP is a web pages.
  • The third rule says if the source address is specially 192.168.0.1 and the destination address is specially 10.10.10.10,and the protocol is FTP, then let the packet through
  • Static-a system administrator sets the rules for the firewall
  • Dynamic-The firewall sets some rules for itself,such as dropping packets from an address that is sending many bad packets
  • Stateful-Packets sent by an attacker often are sent to a port that the attacker has guessed is open; a stateful firewall denies packet sent to any por unless a connection to that port has already been negotiated; this kind of checking puts more processing overhead on the firewall.

2. Application gateway firewall: The ISO-Open system interconnect networking model has seven layers that describe what happen to a packet as it prepared to be sent out on network,and what happen when that packet is received by the machine that is meant to act on it.

Comments

Popular posts from this blog

SECURITY THREATS

INTRODUCTION TO SECURITY THREAT Threats to computer and data system are unit quite real. Characteristic threats area unit solely  a part of the picture; once threat area unit know,it's up to US realize to seek out to search the vulnerabilities in our system and find ways that to stay these threats from occurring. Although threats to info system area unit evolving and bumpers, they will be lessened into three categories:visit- https://yoursystem.in/security-threats/ Natural Threats: These will the best be thought of as threat caused be Mother Natural-floods,earth quakes,tornado,temperature extremes,hurricanes,and storms area unit all examples. Intentional Threats: Laptop crimes area unit the most effective samples of intentional threat,or once somebody advisedly damages property or info.Laptop crimes embrace undercover work,fraud,pornography,and credit card crime. Unintentional Threats : These threats primarily embrace the unauthorized or accidentally delete...

Instagram Facts You Need to Know

  Want to know more about Instagram? Dive into 30 Instagram facts, with up-to-date 2019 information about how Instagram is used throughout the world. Discover insights about one of the most popular social media platforms in the world, including demographic data, major developments, net worth, usage statistics, current leadership, market share, and more. 1. There are 1 billion active monthly Instagram users as of 2019. 2. Instagram officially launched in 2010 as an iPhone app. Within one month, it gained 1 million users (comparatively, it took Foursquare and Twitter two years to reach the 1 million user milestone). 3. 33% of the most-viewed Stories are from businesses. 4. 200 million Instagram users visit at least one business profile every day, and 80% of accounts follow a business on Instagram. 5. There are 25 million businesses on Instagram. 6. 89.5% of Instagram photos are posted normally with no filter (at least from Instagram) ...

HOW TO BROWSE INTERNET SAFELY?

Nowadays everybody using the internet by chrome and firefox and if he/she is mobile they mainly use chrome. there are lots of personal information that can easily be leaked by someone. we all know that the internet has both advantages and disadvantages to it. someone can easily hack you if not serve the internet properly. So, there are some tips and tricks to browse the internet safely. 1. Keep Personal Information Professional and Limited Potential employers or customers don't need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn't hand purely personal information out to strangers individually—don't hand it out to millions of people online. 2. Keep Your Privacy Settings On Marketers love to know all about you, and so do hackers. Both can learn a lot from your browsing and social media usage. But you can take charge of your inform...