Practical Firewall
Practical Firewall
What is Firewall?
Firewall match the network traffic against the rule set defined in its table. Once the
rule is matched, associate action is applied to the network traffic. For example,
Rules are defined as any employee from Human Resources department cannot
access the data from code server and at the same time another rule is defined like
system administrator can access the data from both Human Resource and technical
department. Rules can be defined on the firewall based on the necessity and
security policies of the organization. From the perspective of a server, network
traffic can be either outgoing or incoming.
Firewall maintains a distinct set of rules for both the cases. Mostly the outgoing
traffic, originated from the server itself, allowed to pass. Still, setting a rule on
outgoing traffic is always better in order to achieve more security and prevent
unwanted communication. Incoming traffic is treated differently. Most traffic
which reaches on the firewall is one of these three major Transport Layer
protocols- TCP, UDP or ICMP. All these types have a source address and
destination address. Also, TCP and UDP have port numbers. ICMP uses type code
instead of port number which identifies purpose of that packet.
Types of Firewall
This kind of firewall filters communications at the application layer, and protects
the network. A proxy firewall acts as a gateway between two networks for a
particular application.