123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Firewall- An Overview

Profile Picture
By Author: Kay Johnson
Total Articles: 117
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The term Firewall means a wall to protect the house from fire. Firewall technology was introduced in 1980s, when the Internet was a novel concept in terms of global usage and connectivity. Before firewalls, routers were used for network security for separation of networks from each other.

A Firewall is an application that is present in the computer to inspect the network traffic. It is usually sited in-between a well-protected network and an undefended network. It acts as if it is a gate, which gives protection to the assets and makes sure nothing private goes out and nothing nasty comes in. Basically, Firewall regulates some of the flow of traffic in-between the computer networks where one cannot trust. A Firewall is also integral part of today's computer or the network that is specially designed to obstruct unlawful and illegal access and permitting the authorized communication. It is a tool or an appliance or a set of appliances configured to allow or to deny the computer applications with reference to the set of rules and other criteria.

Firewalls can be installed in either the hardware or software ...
... or its combination of these both. They are always used to block unauthorized users of internet from accessing private networks linked through Internet e.g. Intranet.. All the information, data, entering, or going out, passes through this Firewall. It checks every message and does not allow passing the one that does not meet the specified criteria.

There are different types of firewall available in the market, with different techniques. The packet filters technique- It is the technique that inspects each and every packet that passes through the network. It accepts or allows or rejects the packet based on the user-defined rules. Though, it is not easy and very difficult to configure, it is highly effective and highly transparent for the users. It is exposed to IP Spoofing.

The Application gateway- It is the technique that provides security mechanisms for certain applications, like the FTP and the Telnet servers. It is highly efficient, but one thing that needs to be taken into consideration is that it imposes performance degradation.

The Circuit-level gateway- It is the application, which implies security mechanisms when there is establishment of connectivity of TCP or UDP. At once, if there is connectivity been made, then the packets flows in-between the hosts and the flow of traffic are not further checked.

The Proxy server- It is a kind of technique, which interrupts all messages coming in and going out of the network. The advantage of this is that the proxy server with high effectiveness does not display the true network addresses. It hides the identity of the user, so others cannot misuse it.

The firewall determines if that traffic should continue on to its target or be stopped. The firewall "guard" is important because it keeps the unwanted out and permits only appropriate traffic to enter and leave the computer. To know more about computer security and related issues, visit savemysystem.co.uk. It is the best option for al the computer users that offers reliable services.
Save My System will offer you computer virus removal services in London. We also provideLondon onsite computer repair services.

Total Views: 178Word Count: 531See All articles From Author

Add Comment

Computers Articles

1. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA

2. The Ai Revolution: What’s Coming In 2025
Author: Ben Gross

3. The Rising And Falling Trends Of Graphic Card Prices In 2024
Author: Alahdeen

4. What Is Test-driven Development And Which Three Rules Does It Follow?
Author: Byteahead

5. What Is Web Application Architecture?
Author: goodcoders

6. Understanding How Wifi Works: The Wireless Connection Process Explained
Author: Kr

7. What’s Coming In Cybersecurity For 2025?
Author: Ben Gross

8. Hire Magento Expert In India
Author: Yuvraj Raulji

9. Discovering Everything About C15 Power Cables
Author: Jennifer Truong

10. Want To Get Long-distance Power? Time To Grab Extension Power Cords
Author: Jennifer Truong

11. Best Android Development Tools To Use
Author: Best Android Development Tools To Use

12. Choosing The Right Kansas City Web Design Partner For Your Business Success
Author: naviworld1h

13. The Importance Of Choosing The Right Kansas City Ecommerce Developer And Logo Design Expert
Author: naviworld1h

14. Top Mobile App Companies And Developers In Kansas City
Author: naviworld1h

15. Boost Your Business With A Leading Web Design Company In Kansas City
Author: naviworld1h

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: