Crash Course

How does a firewall work?

Learn how a firewall works in this Crash Course -- then follow our Learning Guide links for more information on types of firewalls, as well as how to select a firewall and position it within your network.

    Requires Free Membership to View

Check out our Firewall Learning Guide for more firewall information
Introduction to firewalls
Types of firewalls      
Network layer      
Application layer      
Proxy      
UTM
Choosing a firewall       
Who is responsible for firewalls?       
Security risk assessment       
Firewall purchasing advice Firewall implementation and placement       
Placement of a firewall       
Are two firewalls better than one?       
Firewall implementation precautions
Firewall management and maintenance

A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise with an intranet that allows its workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to.

Basically, a firewall, working closely with a router program, examines each network packet to determine whether to forward it toward its destination. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users. A firewall is often installed in a specially designated computer separate from the rest of the network so that no incoming request can get directly at private network resources.

There are a number of firewall screening methods. A simple one is to screen requests to make sure they come from acceptable (previously identified) domain name and Internet Protocol addresses. For mobile users, firewalls allow remote access in to the private network by the use of secure logon procedures and authentication certificates.

A number of companies make firewall products. Features include logging and reporting, automatic alarms at given thresholds of attack, and a graphical user interface for controlling the firewall. (Information courtesy of Whatis.com.)

 

This was first published in February 2009

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: