123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Firewall- An Overview

Profile Picture
By Author: Kay Johnson
Total Articles: 117
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The term Firewall means a wall to protect the house from fire. Firewall technology was introduced in 1980s, when the Internet was a novel concept in terms of global usage and connectivity. Before firewalls, routers were used for network security for separation of networks from each other.

A Firewall is an application that is present in the computer to inspect the network traffic. It is usually sited in-between a well-protected network and an undefended network. It acts as if it is a gate, which gives protection to the assets and makes sure nothing private goes out and nothing nasty comes in. Basically, Firewall regulates some of the flow of traffic in-between the computer networks where one cannot trust. A Firewall is also integral part of today's computer or the network that is specially designed to obstruct unlawful and illegal access and permitting the authorized communication. It is a tool or an appliance or a set of appliances configured to allow or to deny the computer applications with reference to the set of rules and other criteria.

Firewalls can be installed in either the hardware or software ...
... or its combination of these both. They are always used to block unauthorized users of internet from accessing private networks linked through Internet e.g. Intranet.. All the information, data, entering, or going out, passes through this Firewall. It checks every message and does not allow passing the one that does not meet the specified criteria.

There are different types of firewall available in the market, with different techniques. The packet filters technique- It is the technique that inspects each and every packet that passes through the network. It accepts or allows or rejects the packet based on the user-defined rules. Though, it is not easy and very difficult to configure, it is highly effective and highly transparent for the users. It is exposed to IP Spoofing.

The Application gateway- It is the technique that provides security mechanisms for certain applications, like the FTP and the Telnet servers. It is highly efficient, but one thing that needs to be taken into consideration is that it imposes performance degradation.

The Circuit-level gateway- It is the application, which implies security mechanisms when there is establishment of connectivity of TCP or UDP. At once, if there is connectivity been made, then the packets flows in-between the hosts and the flow of traffic are not further checked.

The Proxy server- It is a kind of technique, which interrupts all messages coming in and going out of the network. The advantage of this is that the proxy server with high effectiveness does not display the true network addresses. It hides the identity of the user, so others cannot misuse it.

The firewall determines if that traffic should continue on to its target or be stopped. The firewall "guard" is important because it keeps the unwanted out and permits only appropriate traffic to enter and leave the computer. To know more about computer security and related issues, visit savemysystem.co.uk. It is the best option for al the computer users that offers reliable services.
Save My System will offer you computer virus removal services in London. We also provideLondon onsite computer repair services.

Total Views: 172Word Count: 531See All articles From Author

Add Comment

Computers Articles

1. 10 Best Apps For Small Business
Author: 10 Best Apps For Small Business

2. Top Digital Marketing Trends For 2024
Author: Arvind

3. Scaling Your Business With Cloud Management Services: Best Practices
Author: shelli david

4. Full Stack Offline Training In Pune: 100% Job Guarantee
Author: atherv sir

5. Exploring The Potential Of Progressive Web Apps: An In-depth Guide
Author: Elite_m_commerce

6. Mastering Digital Marketing In 2024: Trends, Strategies, And Future Growth
Author: aarcodes marketing

7. How To Identify Scams When Buying Refurbished Laptops
Author: usedstore

8. 9 Tips To Write The Best Press Release
Author: 9 Tips To Write The Best Press Release

9. Bigcommerce Development: Custom App Development, Migrations, And Integrations
Author: Jeet Hanani

10. Find Your Perfect Gaming Gear: Discover Msi Stores Near You
Author: Prachi Grey

11. Unlocking Creativity And Productivity: The Lenovo Yoga Series In Mumbai
Author: Prachi Grey

12. Why You Should Hire A Dedicated Freelance Developer
Author: Upesto IT

13. Migrate Your Classic Storage Accounts To Azure Resource Manager By August 31, 2024
Author: Sparity

14. The Difference Between Virtualization And Cloud Computing
Author: otis

15. Cost Savings: Offshore It Staff Augmentation Explained
Author: Obii Kriationz

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: