Hardware firewalls are important because they provide a strong degree of protection from most forms of attack coming from the outside world. compared to a set of predefined and/or user-created rules that determine whether the packet is to be forwarded or dropped . Consider this scenario: What would happen if you received an e-mail message or visited a website that contained a concealed program? Let's say this program was designed to install itself on your machine and then surreptitiously communicate with someone via the Internet — a distributed denial of service ( DDoS ) attack zombie or a keystroke logger, for example? And trust me, this is by no means an unlikely scenario. http://www.smallbusinesscomputing.com/webmaster/article.php/3103431
Discovery Network sniffer: Documents the discovery of the target IP address and any other useful information, such as protocols being used on the target network Traceroute: Attempts to locate the target device and all intermediate routers, switches, and system Penetration Synflood attack: Used to see whether the firewall can overcome a repeated open connection request and also log the attack Garbage attack: Used to see whether the firewall can overcome random data packets on random ports UDP Ping: Used to see whether the firewall can overcome a large UDP ping packet sent to it TCP Ping: Used to see whether the firewall can overcome a large TCP ping packet sent to it Ping of death:Used to see whether the firewall can overcome a single over-sized packet sent to it
Firewalls are designed to protect you from outside attempts to access your computer, either for the purpose of eavesdropping on your activities, stealing data, sabotage, or using your machine as a means to launch an attack on a third party.
Provides various security services for traffic at the IP layer
These security services include
IPsec overview - how IPsec helps Trish Miller Problem How IPsec helps Details Unauthorized system access Authentication, tamperproofing Defense in depth by isolating trusted from untrusted systems Targeted attacks of high-value servers Authentication, tamperproofing Locking down servers with IPsec. Examples: HR servers, Outlook ® Web Access (OWA), DC replication Eavesdropping Authentication, confidentiality Defense in depth against password or information gathering by untrusted systems Government guideline compliance Authentication, confidentiality Example: “All communications between financial servers must be encrypted.”