FEATURES OF FIREWALLNetwork PolicyAdvanced Authentication MechanismPacket FilteringApplication Gateways
NETWORK POLICYIn order to implement networkpolicy , an organization can issuerules such as , only onecomputer from the entirenetwork is allowed to establishan ftp connection i.e. todownload some content wehave to visit that one particularcomputer.
ADVANCED AUTHENTICATIONWhile running anapplication you might berequired to enter a userid and password. Thishelp to ensure thatmalicious programs doesnot harm your devices, ifyou are confident aboutthat application you canask for the combinationof id and password bythe network admin.
PACKET FILTERINGPackets received by thefirewall are analyzed against adatabase of trustedresources, if verified than theyare allowed throughotherwise annoying messageappears on the screen.Some firewall also logs suchrequest with your IP and youmay be later questionedabout your intentions whilemaking such request
APPLICATION GATEWAYSPopularly known by the name ofapplication proxy or applicationlevel proxy the proxy establishesthe connection with thedestination behind the firewall andacts on behalf of the client, hidingand protecting individualcomputers on the network behindthe firewall.
FIREWALL CAN SAVE US FROM Remote login Application backdoors SMTP session hijacking Operating system bugs Denial of service E-Mail bombs Spam Source routing
WHAT IT CAN’T DOCan’t protect you against malicious insidersCan’t protect you against connections that don’t gothrough it like TOR.Can’t protect against completely new threats.
CONCLUSIONIn order to protect ourselves from all the threats, weactually have to block everything, but that rules outlogic of having an internet connection.Hence the proper way is to block everything and thenallow what we need resulting in the need for a goodnetwork administrator who completely understands theneed of an organization.
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.