You are on page 1of 5

Firewall networks main Istamal Kia jata hai.

Yeh computers or Private Networks ko


Hacking Ssay Bachata Hai. Jab Aap Internet per Koi Be website Dekhna Chatay Hain
Ya Phir Chatting Karna Chatay hai to Program Batata Hai Keh Yeh Program Socket
Use Kar Rha Hai. Masal kay tor per Internet Explorer Port80 use Karta Hai. Jab be
aap web site per jaingay to yeh pochey gaa. Firewall Key Do Kismain Hain
1. Software Firewall
2.Hardware Firewall

Software Friewall
Software Firewall Aak Software Hota Hai Jo Aap say Pochta Hai ka Kay Yeh Program
Internet pay Jane ke koshish kar rhai kai is Ijasa Hai ya Nhein. Zaida Ter loog Norton
Ka yaan Macafee ka Firewall Istmal Karey Hain.

Hardware Firewall
Hardware Firewall main Internet Cable modem yaan Telephone Line is Hardware
main Attach Hoti Hay. Phir Yeh Hardware Externally Computer key saath attach hota
hai. Is ka software Bilcull Software Firewall ke tarhaan Kam Karta Hai. Lakin Har
Chese Phaley Firewall main Jati Hai Phir Internet main Yaan Computer main.

Firewall
A firewall is a network security device that monitors incoming and outgoing network
traffic and decides whether to allow or block specific traffic based on a defined set
of security rules. (Cisco)

A firewall is a network security system, either hardware- or software-based, that


uses rules to control incoming and outgoing network traffic.

A firewall acts as a barrier between a trusted network and an untrusted network. A


firewall controls access to the resources of a network through a positive control
model. This means that the only traffic allowed onto the network is defined in the
firewall policy; all other traffic is denied.
OR
A firewall is a network security system designed to prevent unauthorized access to
or from a private network. Firewalls can be implemented in both hardware and
software, or a combination of both. Network firewalls are frequently used to prevent
unauthorized Internet users from accessing private networks connected to the
Internet, especially intranets. All messages entering or leaving the intranet pass
through the firewall, which examines each message and blocks those that do not
meet the specified security criteria.

Hardware and Software Firewalls

Firewalls can be either hardware or software but the ideal configuration will consist
of both. In addition to limiting access to your computer and network, a firewall is
also useful for allowing remote access to a private network through secure
authentication certificates and logins.
Hardware firewalls can be purchased as a stand-alone product but are also typically
found in broadband routers, and should be considered an important part of your
system and network set-up. Most hardware firewalls will have a minimum of four
network ports to connect other computers, but for larger networks, business
networking firewall solutions are available.

Software firewalls are installed on your computer (like any software) and you can
customize it allowing you some control over its function and protection features. A
software firewall will protect your computer from outside attempts to control or gain
access your computer.

Common Firewall Filtering Techniques


Firewalls are used to protect both home and corporate networks. A typical firewall
program or hardware device filters all information coming through the Internet to
your network or computer system. There are several types of firewall techniques
that will prevent potentially harmful information from getting through:
Packet Filter
Looks at each packet entering or leaving the network and accepts or rejects it based
on user-defined rules. Packet filtering is fairly effective and transparent to users, but
it is difficult to configure.

Application Gateway
Applies security mechanisms to specific applications, such as FTP and Telnet
servers. This is very effective, but can impose a performance degradation.

Circuit-level Gateway
Applies security mechanisms when a TCP or UDP connection is established. Once
the connection has been made, packets can flow between the hosts without further
checking.

Proxy Server
Intercepts all messages entering and leaving the network. The proxy server
effectively hides the true network addresses.
In practice, many firewalls use two or more of these techniques in concert. A firewall
is considered a first line of defense in protecting private information. For greater
security, data can be encrypted.
OR

Firewall Types

Proxy firewall
An early type of firewall device, a proxy firewall serves as the gateway from one
network to another for a specific application. Proxy servers can provide additional
functionality such as content caching and security by preventing direct connections
from outside the network. However, this also may impact throughput capabilities
and the applications they can support.

Stateful inspection firewall


Now thought of as a traditional firewall, a Stateful inspection firewall allows or
blocks traffic based on state, port, and protocol. It monitors all activity from the
opening of a connection until it is closed. Filtering decisions are made based on both
administrator-defined rules as well as context, which refers to using information
from previous connections and packets belonging to the same connection.

Unified threat management (UTM) firewall


A UTM device typically combines, in a loosely coupled way, the functions of a
Stateful inspection firewall with intrusion prevention and antivirus. It may also
include additional services and often cloud management.

Next-generation firewall (NGFW)

Firewalls have evolved beyond simple packet filtering and Stateful inspection. Most
companies are deploying next-generation firewalls to block modern threats such as
advanced malware and application-layer attacks.

According to Gartner, Inc.s definition, a next-generation firewall must include:

Standard firewall capabilities like stateful inspection


Integrated intrusion prevention
Application awareness and control to see and block risky apps
Upgrade paths to include future information feeds
Techniques to address evolving security threats
While these capabilities are increasingly becoming the standard for most
companies, NGFWs can do more.

Compare industry NGFWs.

Threat-focused NGFW

These firewalls include all the capabilities of a traditional NGFW and also provide
advanced threat detection and remediation. With a threat-focused NGFW you can:

Know which assets are most at risk with complete context awareness
Quickly react to attacks with intelligent security automation that sets policies and
hardens your defenses dynamically
Better detect evasive or suspicious activity with network and endpoint event
correlation
Greatly decrease the time from detection to cleanup with retrospective security that
continuously monitors for suspicious activity and behavior even after initial
inspection
Ease administration and reduce complexity with unified policies that protect across
the entire attack continuum

You might also like