SlideShare a Scribd company logo
1 of 13
Firewalls: The Basics
Firewalls: The Basics
This is a basic overview of how
firewalls work and play an active role
in network security.
We will cover the following topics:
• What is a firewall?
• How firewalls are used?
• How does a firewall work?
What is a firewall?
Firewalls: Defined
By definition a firewall is a hardware
appliance or software solution used to
enforce security policies. It is used to
protect the resources of one network
and from users from other networks. It
protects the network by allowing and
restricting port communications over the
internet and intranet.
Firewalls: How a firewall works
External “Dirty” Internal “Clean”
A firewall is either an appliance or software
running on a server that is placed at the
entry/exiting point of your network. The firewall
has two Network Interface Cards (NIC’s). One NIC
is used for external “dirty” traffic. The second NIC
is for internal “clean” traffic.
Firewalls: How a firewall works
The software is used to configure how the traffic will be regulated. You can block
or allow traffic based on port number, protocols, services and IP addresses. Once
the configuration is in place you can keep track of the inbound and outbound
traffic. Which will in turn assist you in conducting trend analysis to help make
your network more secure.
Service being used
Port being used
Whether the TCP/UDP
protocol is opened of
closed for the service to
communicate
Where you input your
trusted and non-
trusted individual IP
addresses or IP range
Firewalls: How a firewall works
Firewall
Network Address Translation (NAT)
Virus Check
URL Filtering
Application backdoors
IP address blocking
Source Routing
Once the traffic enters the firewall it goes through a series of checks. Some of
these checks include:​
• If the IP address is allowed to talk through the firewall.​
• The firewall uses a URL filter to check if a URL is on the allowed or
blocked list.​
• A virus check is performed for packages that are being downloaded.​
• Network backdoors that might be opened by applications or operating
systems.
Firewalls: How a firewall works
Finally after all the traffic has been checked it is
allowed to pass through and to the end user.
When the request from the end user is made it
goes through the process once more on the
way to the Internet.
Firewalls: How a firewall is Used
In the following two slides are examples of very
different networks. One is a small home network;
the other is a large Enterprise Network. Even
though the architecture of the networks a very
different the goal is the same, to protect the data
and the integrity of the network. That’s why
firewalls are incorporated into both networks. With
the firewalls in place and working correctly it
provides protection from hackers, viruses, spam,
and other influences coming from outside and
inside of your network.
Home Network Layout
This home network shows the firewall protecting both the network devices.
Both the Wireless and Ethernet routers have firewalls installed. This gives the
home user layered protection. Layered protection is necessary incase the
primary firewall fails, and then there is another firewall in place to protect the
network.
Firewalls: How a firewall is Used
Enterprise Network Architecture
In this example of an Enterprise Network you will notice that the
first two routers and the firewalls are connected. By connecting the
routers and firewalls with each other, and enabling them to
communicate they have a High Availability status. This means that if
one primary device becomes unavailable the secondary or fall back
devices will become active and communication will continue.
Primary Route
Secondary Route
Router
Router
Router
Router
Firewalls: How a firewall is Used
External IP Address
Internal IP Address
Protocol
Port Number
Firewalls: How a firewall is Used
Another way a firewall is used to protect a network is by using Network Address Translation
(NAT). NATing is used in order to enable multiple hosts on a private network to access the
Internet using a single public IP address. ​
It also blocks your internal IP address from the outside world. In the firewall configuration
you can set the two IP addresses to use for you address translation. The external address
which is usually your ISP address. The internal address which is your private network. ​
If a hacker tries to probe your network the only IP address that will be seen is you external IP
address.
Firewalls are not just used monitor and regulate
network and internet traffic. An example of this is a Mail
Firewall. A Mail Firewall and a Network Firewall work on
the same principle in protecting the network. The
difference is that a Mail Firewall concentrates on
scanning all incoming and outgoing e-mail.
The Mail Firewall is usually behind the Network Firewall
in the network architecture. It scans the e-mail for
malware, spy ware, viruses, and phishing attempts. If it
contains any of these things it can be blocked by either
an individual e-mail address or an entire domain. It can
be configured so that if a certain word shows up in an
e-mail subject line or body it will reject or quarantine
the message.
Firewalls: How a firewall is Used
In conclusion remember that firewalls are
useful in:
• Firewalls are either specialized
appliances or software applications
• Protecting Network Integrity by
opening and closing ports on the
network
• Blocking from viruses, spy ware, and
malware
• Using URL filters so harmful websites
cannot be accessed
Firewalls: The Basics Summary

More Related Content

What's hot

FireWall
FireWallFireWall
FireWallrubal_9
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purposeRohit Phulsunge
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Mohammed Adam
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentationMahmoud Ibra
 

What's hot (20)

FireWall
FireWallFireWall
FireWall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Network security
Network securityNetwork security
Network security
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Network security
Network securityNetwork security
Network security
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
 
Cyber security
Cyber securityCyber security
Cyber security
 
Firewall
Firewall Firewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Network security
Network security Network security
Network security
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 

Similar to Firewall basics

Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdfImXaib
 
Firewall
FirewallFirewall
FirewallApo
 
What is fire wall and how it works
What is fire wall and how it worksWhat is fire wall and how it works
What is fire wall and how it worksnetsourceid
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURESakshiSolapure1
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsüremin_oz
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfjibinsh
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
Firewall ppt
Firewall pptFirewall ppt
Firewall pptRevanth71
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfDr. Shivashankar
 

Similar to Firewall basics (20)

Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
Firewall
FirewallFirewall
Firewall
 
What is fire wall and how it works
What is fire wall and how it worksWhat is fire wall and how it works
What is fire wall and how it works
 
Firewall
FirewallFirewall
Firewall
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Firewalls
FirewallsFirewalls
Firewalls
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdf
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
Ch20 book
Ch20 bookCh20 book
Ch20 book
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Firewall basics

  • 2. Firewalls: The Basics This is a basic overview of how firewalls work and play an active role in network security. We will cover the following topics: • What is a firewall? • How firewalls are used? • How does a firewall work?
  • 3. What is a firewall? Firewalls: Defined By definition a firewall is a hardware appliance or software solution used to enforce security policies. It is used to protect the resources of one network and from users from other networks. It protects the network by allowing and restricting port communications over the internet and intranet.
  • 4. Firewalls: How a firewall works External “Dirty” Internal “Clean” A firewall is either an appliance or software running on a server that is placed at the entry/exiting point of your network. The firewall has two Network Interface Cards (NIC’s). One NIC is used for external “dirty” traffic. The second NIC is for internal “clean” traffic.
  • 5. Firewalls: How a firewall works The software is used to configure how the traffic will be regulated. You can block or allow traffic based on port number, protocols, services and IP addresses. Once the configuration is in place you can keep track of the inbound and outbound traffic. Which will in turn assist you in conducting trend analysis to help make your network more secure. Service being used Port being used Whether the TCP/UDP protocol is opened of closed for the service to communicate Where you input your trusted and non- trusted individual IP addresses or IP range
  • 6. Firewalls: How a firewall works Firewall Network Address Translation (NAT) Virus Check URL Filtering Application backdoors IP address blocking Source Routing Once the traffic enters the firewall it goes through a series of checks. Some of these checks include:​ • If the IP address is allowed to talk through the firewall.​ • The firewall uses a URL filter to check if a URL is on the allowed or blocked list.​ • A virus check is performed for packages that are being downloaded.​ • Network backdoors that might be opened by applications or operating systems.
  • 7. Firewalls: How a firewall works Finally after all the traffic has been checked it is allowed to pass through and to the end user. When the request from the end user is made it goes through the process once more on the way to the Internet.
  • 8. Firewalls: How a firewall is Used In the following two slides are examples of very different networks. One is a small home network; the other is a large Enterprise Network. Even though the architecture of the networks a very different the goal is the same, to protect the data and the integrity of the network. That’s why firewalls are incorporated into both networks. With the firewalls in place and working correctly it provides protection from hackers, viruses, spam, and other influences coming from outside and inside of your network.
  • 9. Home Network Layout This home network shows the firewall protecting both the network devices. Both the Wireless and Ethernet routers have firewalls installed. This gives the home user layered protection. Layered protection is necessary incase the primary firewall fails, and then there is another firewall in place to protect the network. Firewalls: How a firewall is Used
  • 10. Enterprise Network Architecture In this example of an Enterprise Network you will notice that the first two routers and the firewalls are connected. By connecting the routers and firewalls with each other, and enabling them to communicate they have a High Availability status. This means that if one primary device becomes unavailable the secondary or fall back devices will become active and communication will continue. Primary Route Secondary Route Router Router Router Router Firewalls: How a firewall is Used
  • 11. External IP Address Internal IP Address Protocol Port Number Firewalls: How a firewall is Used Another way a firewall is used to protect a network is by using Network Address Translation (NAT). NATing is used in order to enable multiple hosts on a private network to access the Internet using a single public IP address. ​ It also blocks your internal IP address from the outside world. In the firewall configuration you can set the two IP addresses to use for you address translation. The external address which is usually your ISP address. The internal address which is your private network. ​ If a hacker tries to probe your network the only IP address that will be seen is you external IP address.
  • 12. Firewalls are not just used monitor and regulate network and internet traffic. An example of this is a Mail Firewall. A Mail Firewall and a Network Firewall work on the same principle in protecting the network. The difference is that a Mail Firewall concentrates on scanning all incoming and outgoing e-mail. The Mail Firewall is usually behind the Network Firewall in the network architecture. It scans the e-mail for malware, spy ware, viruses, and phishing attempts. If it contains any of these things it can be blocked by either an individual e-mail address or an entire domain. It can be configured so that if a certain word shows up in an e-mail subject line or body it will reject or quarantine the message. Firewalls: How a firewall is Used
  • 13. In conclusion remember that firewalls are useful in: • Firewalls are either specialized appliances or software applications • Protecting Network Integrity by opening and closing ports on the network • Blocking from viruses, spy ware, and malware • Using URL filters so harmful websites cannot be accessed Firewalls: The Basics Summary