Professional Documents
Culture Documents
Firewall
Characteristic of Firewall
Direction control: Helps determine direction for the initiation of
requests allowed to flow from Firewalls.
Service control: To determine types of services that are accessible,
such as outbound and inbound. Traffic can be filtered on the basis of
protocol, port number, proxy servers and IP addresses.
Behavior control: It controls some particular services. A portion of the
information provided on a local web server may be externally
accessible.
User Control: It can be applied for incoming traffic from external users
and requires some form of authentication such as provided by IPsec.
Next Generation Firewalls came into the picture due to some limitations in
Stateful Packet Inspection as it does not inspect network packets
containing data payload and also due to high network traffic, it uses web
protocols, including business and non-business applications. New
approaches have been added by security vendors, including deep packet
and inspection intrusion prevention, for the detection of malware in
network traffic.
This can be a drawback too as these approaches add more and more
devices that add latency, as these packets are passed from one appliance
to the other. These devices should be configured in some unified threat
management systems so that multiple functions can be handled in a
single platform. NGFW helps address application awareness drawbacks
and traffic inspection, without hampering performance.
Unified Threat Management (UTM) solutions These are the solutions that
combine stateful examination firewalls, IPS and antivirus into a single
machine by taking into account other network security capabilities.
Next-generation firewalls (NGFWs) These firewalls were created to
counteract the growing capability of appliances and malware. The NGFW
brings together the major network protection functions, comprising of
unconventional firewall, URL filtering, IPS/IDS and threat security. The
NGFW solutions ensure improved security as compared to the legacy
firewalls, point threat finding products, or UTMs. These functions are
designed into the product from the beginning and share important
information across various disciplines.
Benefits of Firewall
Prevent attacks on your private network by the other networks outside
the world.
It allows you to define a funnel, keeping aside the non-authorized users.
Allow monitoring the security of your network and computer when
suspicious activity occurs, it will generate an alarm.
Monitor and record services using WWW (World Wide Web), FTP (File
Transfer Protocol) and other protocols.
Control the use of Internet. It helps to block or un-block inappropriate or
appropriate material.
Disadvantages of Firewall
Cyberoam Technologies
USA Central : +1-732-412-4896
Delhi & NCR : +91-9899150300
Ahmedabad : +91-9925011328
Bangalore:
+91-9880345671
Dubai:
+971-4-214 9860
North America
505 Thornall
Street, Suite #
304
Edison, NJ
-08837
USA
Cyberoam House,
Saigulshan Complex,
Opp. Sanskruti,
Beside White House,
Panchwati Cross
Road,
Ahmedabad - 380006,
GUJARAT, INDIA.
sales@cyberoam.com
http://www.cyberoam.com/
Thank You