Firewall (Computing) - Wikipedia
Firewall (Computing) - Wikipedia
(computing)
In comput ing, a firewall is a net work securit y syst em t hat monit ors and cont rols
incoming and out going net work t raffic based on configurable securit y rules.[1][2] A
firewall t ypically est ablishes a barrier bet ween a t rust ed net work and an unt rust ed
net work, such as t he Int ernet ,[3] or bet ween several VLANs.
History
The t erm firewall originally referred t o a wall int ended t o confine a fire wit hin a line of
adjacent buildings.[4] Lat er uses refer t o similar st ruct ures, such as t he met al sheet
separat ing t he engine compart ment of a vehicle or aircraft from t he passenger
compart ment . The t erm was applied in t he 1980s t o net work t echnology[5] t hat
emerged when t he Int ernet was fairly new in t erms of it s global use and
connect ivit y.[6] The predecessors t o firewalls for net work securit y were rout ers used
in t he 1980s. Because t hey already segregat ed net works, rout ers could apply filt ering
t o packet s crossing t hem.[7]
Before it was used in real-life comput ing, t he t erm appeared in John Badham's 1983
comput er‑hacking movie WarGames, spoken by t he bearded and bespect acled
programmer named Paul Richt er, which possibly inspired it s lat er use.[8]
One of t he earliest commercially successful firewall and net work address t ranslat ion
(NAT) product s was t he PIX (Privat e Int ernet eXchange) Firewall, invent ed in 1994 by
Net work Translat ion Inc., a st art up founded and run by John Mayes. The PIX Firewall
t echnology was coded by Brant ley Coile as a consult ant soft ware developer.[9]
Recognizing t he emerging IPv4 address deplet ion problem, t hey designed t he PIX t o
enable organizat ions t o securely connect privat e net works t o t he public int ernet using
a limit ed number of regist ered IP addresses. The innovat ive PIX solut ion quickly
gained indust ry acclaim, earning t he prest igious "Hot Product of t he Year" award from
Dat a Communicat ions Magazine in January 1995. Cisco Syst ems, seeking t o expand
int o t he rapidly growing net work securit y market , subsequent ly acquired Net work
Translat ion Inc. in November 1995 t o obt ain t he right s t o t he PIX t echnology. The PIX
became one of Cisco's flagship firewall product lines before event ually being
succeeded by t he Adapt ive Securit y Appliance (ASA) plat form int roduced in 2005.
Types of firewall
Firewalls are cat egorized as a net work-based or a host -based syst em. Net work-
based firewalls are posit ioned bet ween t wo or more net works, t ypically bet ween t he
local area net work (LAN) and wide area net work (WAN),[10] t heir basic funct ion being
t o cont rol t he flow of dat a bet ween connect ed net works. They are eit her a soft ware
appliance running on general-purpose hardware, a hardware appliance running on
special-purpose hardware, or a virt ual appliance running on a virt ual host cont rolled by
a hypervisor. Firewall appliances may also offer non-firewall funct ionalit y, such as
DHCP [11][12] or VPN[13] services. Host -based firewalls are deployed direct ly on t he
host it self t o cont rol net work t raffic or ot her comput ing resources.[14][15] This can be
a daemon or service as a part of t he operat ing syst em or an agent applicat ion for
prot ect ion.
An illustration of a network-based
firewall within a network
Packet filter
The first report ed t ype of net work firewall is called a packet filt er, which inspect s
packet s t ransferred bet ween comput ers. The firewall maint ains an access-cont rol list
which dict at es what packet s will be looked at and what act ion should be applied, if
any, wit h t he default act ion set t o silent discard. Three basic act ions regarding t he
packet consist of a silent discard, discard wit h Int ernet Cont rol Message Prot ocol or
TCP reset response t o t he sender, and forward t o t he next hop.[16] Packet s may be
filt ered by source and dest inat ion IP addresses, prot ocol, or source and dest inat ion
port s. The bulk of Int ernet communicat ion in 20t h and early 21st cent ury used eit her
Transmission Cont rol Prot ocol (TCP) or User Dat agram Prot ocol (UDP) in conjunct ion
wit h well-known port s, enabling firewalls of t hat era t o dist inguish bet ween specific
t ypes of t raffic such as web browsing, remot e print ing, email t ransmission, and file
t ransfers.[17][18]
The first paper published on firewall t echnology was in 1987 when engineers from
Digit al Equipment Corporat ion (DEC) developed filt er syst ems known as packet filt er
firewalls. At AT&T Bell Labs, Bill Cheswick and St eve Bellovin cont inued t heir research
in packet filt ering and developed a working model for t heir own company based on
t heir original first -generat ion archit ect ure.[19] In 1992, St even McCanne and Van
Jacobson released a paper on BSD Packet Filt er (BPF) while at Lawrence Berkeley
Laborat ory.[20][21]
Connection tracking
Second-generat ion firewalls perform t he work of t heir first -generat ion predecessors
but also maint ain knowledge of specific conversat ions bet ween endpoint s by
remembering which port number t he t wo IP addresses are using at layer 4 (t ransport
layer) of t he OSI model for t heir conversat ion, allowing examinat ion of t he overall
exchange bet ween t he nodes.[23]
Application layer
Marcus Ranum, Wei Xu, and Pet er Churchyard released an applicat ion firewall known as
Firewall Toolkit (FWTK) in Oct ober 1993.[24] This became t he basis for Gaunt let
firewall at Trust ed Informat ion Syst ems.[25][26]
The key benefit of applicat ion layer filt ering is t hat it can underst and cert ain
applicat ions and prot ocols such as File Transfer Prot ocol (FTP), Domain Name
Syst em (DNS), or Hypert ext Transfer Prot ocol (HTTP). This allows it t o ident ify
unwant ed applicat ions or services using a non st andard port , or det ect if an allowed
prot ocol is being abused.[27] It can also provide unified securit y management including
enforced encrypt ed DNS and virt ual privat e net working.[28][29][30]
As of 2012, t he next -generat ion firewall provides a wider range of inspect ion at t he
applicat ion layer, ext ending deep packet inspect ion funct ionalit y t o include, but is not
limit ed t o:
Web filtering
Intrusion prevention systems
User identity management
Web application firewall
Content inspection and heuristic
analysis[31]
TLS Inspection
Endpoint specific
Endpoint -based applicat ion firewalls funct ion by det ermining whet her a process
should accept any given connect ion. Applicat ion firewalls filt er connect ions by
examining t he process ID of dat a packet s against a rule set for t he local process
involved in t he dat a t ransmission. Applicat ion firewalls accomplish t heir funct ion by
hooking int o socket calls t o filt er t he connect ions bet ween t he applicat ion layer and
t he lower layers. Applicat ion firewalls t hat hook int o socket calls are also referred t o
as socket filt ers.
Firewall Policies
At t he core of a firewall's operat ion are t he policies t hat govern it s decision-making
process. These policies, collect ively known as firewall rules, are t he specific
guidelines t hat det ermine t he t raffic allowed or blocked across a net work's
boundaries. [32][33]
Firewall rules are based on t he evaluat ion of net work packet s against predet ermined
securit y crit eria. A net work packet , which carries dat a across net works, must mat ch
cert ain at t ribut es defined in a rule t o be allowed t hrough t he firewall. These at t ribut es
commonly include:
Direction: Inbound or outbound
traffic
Source: Where the traffic originates
(IP address, range, network, or
zone)
Destination: Where the traffic is
headed (IP address, range, network,
or zone)
Port: Network ports specific to
various services (e.g., port 80 for
HTTP)
Protocol: The type of network
protocol (e.g., TCP, UDP, ICMP)
Applications: L7 inspection or
grouping av services.
Action: Whether to allow, deny,
drop, or require further inspection
for the traffic
Zones
Zones are logical segment s wit hin a net work t hat group t oget her devices wit h similar
securit y requirement s. By part it ioning a net work int o zones, such as "Technical",
"WAN", "LAN", "Public," "Privat e," "DMZ", and "Wireless," administ rat ors can enforce
policies t hat cont rol t he flow of t raffic bet ween t hem. Each zone has it s own level of
t rust and is governed by specific firewall rules t hat regulat e t he ingress and egress of
dat a.
I t ypical default is t o allow all t raffic from LAN t o WAN, and t o drop all t raffic from
WAN t o LAN.
Services
In net working t erms, services are specific funct ions t ypically ident ified by a net work
port and prot ocol. Common examples include HTTP/HTTPS (web t raffic) on port s 80
and 443, FTP (file t ransfer) on port 21, and SMTP (email) on port 25. Services are t he
engines behind t he applicat ions users depend on. From a securit y aspect , cont rolling
access t o services is crucial because services are common t arget s for exploit at ion.
Firewalls employ rules t hat st ipulat e which services should be accessible, t o whom,
and in what cont ext . For example, a firewall might be configured t o block incoming
FTP request s t o prevent unaut horized file uploads but allow out going HTTPS
request s for web browsing.
Applications
Applicat ions refer t o t he soft ware syst ems t hat users int eract wit h while on t he
net work. They can range from web browsers and email client s t o complex dat abase
syst ems and cloud-based services. In net work securit y, applicat ions are import ant
because different t ypes of t raffic can pose varying securit y risks. Thus, firewall rules
can be craft ed t o ident ify and cont rol t raffic based on t he applicat ion generat ing or
receiving it . By using applicat ion awareness, firewalls can allow, deny, or limit t raffic for
specific applicat ions according t o organisat ional policies and compliance
requirement s, t hereby mit igat ing pot ent ial t hreat s from vulnerable or undesired
applicat ions.
USER ID
Implement ing firewall rules based on IP addresses alone is oft en insufficient due t o
t he dynamic nat ure of user locat ion and device usage. [34][35] User ID will be t ranslat e
t o a IP address.
This is where t he concept of "User ID" makes a significant impact . User ID allows
firewall rules t o be craft ed based on individual user ident it ies, rat her t han just fixed
source or dest inat ion IP addresses. This enhances securit y by enabling more granular
cont rol over who can access cert ain net work resources, regardless of where t hey are
connect ing from or what device t hey are using.
The User ID t echnology is t ypically int egrat ed int o firewall syst ems t hrough t he use
of direct ory services such as Act ive Direct ory, LDAP, RADIUS or TACACS+. These
services link t he user's login informat ion t o t heir net work act ivit ies. By doing t his, t he
firewall can apply rules and policies t hat correspond t o user groups, roles, or individual
user account s inst ead of purely relying on t he net work t opology.
Example of Using User ID in Firewall
Rules
Consider an school t hat want s t o rest rict access t o a social media server from
st udent s. They can creat e a rule in t he firewall t hat ut ilises User ID informat ion t o
enforce t his policy.
Configuration
Set t ing up a firewall is a complex and error-prone t ask. A net work may face securit y
issues due t o configurat ion errors.[36]
Firewall policy configurat ion is based on specific net work t ype (e.g., public or privat e),
and can be set up using firewall rules t hat eit her block or allow access t o prevent
pot ent ial at t acks from hackers or malware.[37]
See also
References
External links
Retrieved from
"https://en.wikipedia.org/w/index.php?
title=Firewall_(computing)&oldid=126396547
9"