0% found this document useful (0 votes)
7 views

Introduction of Firewall in Computer Network _ GeeksforGeeks

A firewall is a network security device that monitors and controls incoming and outgoing traffic based on predefined security rules, acting as a barrier between a private network and the internet. It is essential for protecting networks from unauthorized access, malware, and other threats, with various types including packet filtering, stateful inspection, and application layer firewalls. While firewalls offer significant advantages in network security, they also come with challenges such as complexity, limited visibility, and potential performance impacts.

Uploaded by

Jagrat Sahni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Introduction of Firewall in Computer Network _ GeeksforGeeks

A firewall is a network security device that monitors and controls incoming and outgoing traffic based on predefined security rules, acting as a barrier between a private network and the internet. It is essential for protecting networks from unauthorized access, malware, and other threats, with various types including packet filtering, stateful inspection, and application layer firewalls. While firewalls offer significant advantages in network security, they also come with challenges such as complexity, limited visibility, and potential performance impacts.

Uploaded by

Jagrat Sahni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Search...

Full Stack Course HTML CSS JavaScript TypeScript jQuery AngularJS ReactJS Switch
Next.jsto Dark Mode
React Na

Introduction of Firewall in Computer Network


Last Updated : 04 Feb, 2025

A firewall is a network security device either hardware or software-based


which monitors all incoming and outgoing traffic and based on a defined set
of security rules it accepts, rejects, or drops that specific traffic. It acts like a
security guard that helps keep your digital world safe from unwanted visitors
and potential threats.

Accept: allow the traffic


Reject: block the traffic but reply with an “unreachable error”
Drop: block the traffic with no reply

A firewall is a type of network security device that filters incoming and


outgoing network traffic with security policies that have previously been set
up inside an organization. A firewall is essentially the wall that separates a
private internal network from the open Internet at its very basic level.

Need For Firewall


Before Firewalls, network security was performed by Access Control Lists
(ACLs) residing on routers. ACLs are rules that determine whether network
access should be granted or denied to specific IP address. But ACLs cannot
determine the nature of the packet it is blocking. Also, ACL alone does not
have the capacity to keep threats out of the network. Hence, the Firewall
was introduced. Connectivity to the Internet is no longer optional for
organizations. However, accessing the Internet provides benefits to the
organization; it also enables the outside world to interact with the internal
network of the organization. This creates a threat to the organization. In
order to secure the internal network from unauthorized traffic, we need a
Firewall.

History of Firewalls
Late 1980s: Jeff Mogul, Brian Reid, and Paul Vixie at Digital Equipment
Corp (DEC) developed packet-filtering technology, laying the groundwork
for firewalls by checking external connections before they reached
internal networks.
Late 1980s – Early 1990s: AT&T Bell Labs researchers, including
Presotto, Sharma, and Nigam, developed the circuit-level gateway, a
firewall that vetted ongoing connections without reauthorizing each data
packet, paving the way for more efficient security.
1991-1992: Marcus Ranum introduced security proxies at DEC, leading to
the creation of the Secure External Access Link (SEAL), the first
commercially available application-layer firewall, based on earlier DEC
work.
1993-1994: At Check Point, Gil Shwed pioneered stateful inspection
technology, filing a patent in 1993. Nir Zuk developed a graphical
interface for Firewall-1, making firewalls accessible and widely adopted
by businesses and homes

Working of Firewall
Firewall match the network traffic against the rule set defined in its table.
Once the rule is matched, associate action is applied to the network
traffic. For example, Rules are defined as any employee from Human
Resources department cannot access the data from code server and at the
same time another rule is defined like system administrator can access the
data from both Human Resource and technical department.
Rules can be defined on the firewall based on the necessity and security
policies of the organization.
From the perspective of a server, network traffic can be either outgoing or
incoming. Firewall maintains a distinct set of rules for both the cases.
Mostly the outgoing traffic, originated from the server itself, allowed to
pass. Still, setting a rule on outgoing traffic is always better in order to
achieve more security and prevent unwanted communication. Incoming
traffic is treated differently.
Most traffic which reaches on the firewall is one of these three major
Transport Layer protocols- TCP, UDP or ICMP. All these types have a
source address and destination address. Also, TCP and UDP have port
numbers. ICMP uses type code instead of port number which identifies
purpose of that packet.

Default policy: It is very difficult to explicitly cover every possible rule on the
firewall. For this reason, the firewall must always have a default policy.
Default policy only consists of action (accept, reject or drop). Suppose no rule
is defined about SSH connection to the server on the firewall. So, it will
follow the default policy. If default policy on the firewall is set to accept, then
any computer outside of your office can establish an SSH connection to the
server. Therefore, setting default policy as drop (or reject) is always a good
practice.

Types of Firewall
Firewalls can be categorized based on their generation.

1. Packet Filtering Firewall

Packet filtering firewall is used to control network access by monitoring


outgoing and incoming packets and allowing them to pass or stop based on
source and destination IP address, protocols, and ports. It analyses traffic at
the transport protocol layer (but mainly uses first 3 layers). Packet firewalls
treat each packet in isolation. They have no ability to tell whether a packet is
part of an existing stream of traffic. Only It can allow or deny the packets
based on unique packet headers. Packet filtering firewall maintains a filtering
table that decides whether the packet will be forwarded or discarded. From
the given filtering table, the packets will be filtered according to the
following rules:

Incoming packets from network 192.168.21.0 are blocked.


Incoming packets destined for the internal TELNET server (port 23) are
blocked.
Incoming packets destined for host 192.168.21.3 are blocked.
All well-known services to the network 192.168.21.0 are allowed.

2. Stateful Inspection Firewall

Stateful firewalls (performs Stateful Packet Inspection) are able to determine


the connection state of packet, unlike Packet filtering firewall, which makes it
more efficient. It keeps track of the state of networks connection travelling
across it, such as TCP streams. So the filtering decisions would not only be
based on defined rules, but also on packet’s history in the state table.

3. Application Layer Firewall


Application layer firewall can inspect and filter the packets on any OSI layer,
up to the application layer. It has the ability to block specific content, also
recognize when certain application and protocols (like HTTP, FTP) are being
misused. In other words, Application layer firewalls are hosts that run proxy
servers. A proxy firewall prevents the direct connection between either side
of the firewall, each packet has to pass through the proxy.

4. Next Generation Firewalls (NGFW)

NGFW consists of Deep Packet Inspection, Application Inspection, SSL/SSH


inspection and many functionalities to protect the network from these
modern threats.

5. Circuit Level Gateway Firewall

This works as the Sessions layer of the OSI Model’s . This allows for the
simultaneous setup of two Transmission Control Protocol (TCP) connections.
It can effortlessly allow data packets to flow without using quite a lot of
computing power. These firewalls are ineffective because they do not inspect
data packets; if malware is found in a data packet, they will permit it to pass
provided that TCP connections are established properly.

6. Software Firewall

A software firewall is any firewall that is set up locally or on a cloud server.


When it comes to controlling the inflow and outflow of data packets and
limiting the number of networks that can be linked to a single device, they
may be the most advantageous. But the problem with software firewall is
they are time-consuming.

7. Hardware Firewall

They also go by the name “firewalls based on physical appliances.” It


guarantees that the malicious data is halted before it reaches the network
endpoint that is in danger.

8. Cloud Firewall

These are software-based, cloud-deployed network devices. This cloud-


based firewall protects a private network from any unwanted access. Unlike
traditional firewalls, a cloud firewall filters data at the cloud level.

Importance of Firewalls
So, what does a firewall do and why is it important? Without protection,
networks are vulnerable to any traffic trying to access your systems, whether
it’s harmful or not. That’s why it’s crucial to check all network traffic.

When you connect personal computers to other IT systems or the internet, it


opens up many benefits like collaboration, resource sharing, and creativity.
But it also exposes your network and devices to risks like hacking, identity
theft, malware, and online fraud.

Once a malicious person finds your network, they can easily access and
threaten it, especially with constant internet connections.

Using a firewall is essential for proactive protection against these risks. It


helps users shield their networks from the worst dangers.

What Does Firewall Security Do?


A firewall serves as a security barrier for a network, narrowing the attack
surface to a single point of contact. Instead of every device on a network
being exposed to the internet, all traffic must first go through the firewall.
This way, the firewall can filter and block non-permitted traffic, whether it’s
coming in or going out. Additionally, firewalls help create a record of
attempted connections, improving security awareness.

What Can Firewalls Protect Against?

Infiltration by Malicious Actors: Firewalls can block suspicious


connections, preventing eavesdropping and advanced persistent threats
(APTs).
Parental Controls: Parents can use firewalls to block their children from
accessing explicit web content.
Workplace Web Browsing Restrictions: Employers can restrict
employees from using the company network to access certain services
and websites, like social media.
Nationally Controlled Intranet: Governments can block access to certain
web content and services that conflict with national policies or values.

By allowing network owners to set specific rules, firewalls offer


customizable protection for various scenarios, enhancing overall network
security.

Advantages of Using Firewall


Protection From Unauthorized Access: Firewalls can be set up to restrict
incoming traffic from particular IP addresses or networks, preventing
hackers or other malicious actors from easily accessing a network or
system. Protection from unwanted access.
Prevention of Malware and Other Threats: Malware and other threat
prevention: Firewalls can be set up to block traffic linked to known
malware or other security concerns, assisting in the defense against these
kinds of attacks.
Control of Network Access: By limiting access to specified individuals or
groups for particular servers or applications, firewalls can be used to
restrict access to particular network resources or services.
Monitoring of Network Activity: Firewalls can be set up to record and
keep track of all network activity.
Regulation Compliance: Many industries are bound by rules that demand
the usage of firewalls or other security measures.
Network Segmentation: By using firewalls to split up a bigger network
into smaller subnets, the attack surface is reduced and the security level is
raised.

Disadvantages of Using Firewall


Complexity: Setting up and keeping up a firewall can be time-consuming
and difficult, especially for bigger networks or companies with a wide
variety of users and devices.
Limited Visibility: Firewalls may not be able to identify or stop security
risks that operate at other levels, such as the application or endpoint
level, because they can only observe and manage traffic at the network
level.
False Sense of Security: Some businesses may place an excessive
amount of reliance on their firewall and disregard other crucial security
measures like endpoint security or intrusion detection systems.
Limited adaptability: Because firewalls are frequently rule-based, they
might not be able to respond to fresh security threats.
Performance Impact: Network performance can be significantly impacted
by firewalls, particularly if they are set up to analyze or manage a lot of
traffic.
Limited Scalability: Because firewalls are only able to secure one
network, businesses that have several networks must deploy many
firewalls, which can be expensive.
Limited VPN support: Some firewalls might not allow complex VPN
features like split tunneling, which could restrict the experience of a
remote worker.
Cost: Purchasing many devices or add-on features for a firewall system
can be expensive, especially for businesses.

Question: A packet filtering firewall can [ISRO CS 2013]

(A) Deny certain users from accessing a service

(B) Block worms and viruses from entering the network

(C) Disallow some files from being accessed through FTP

(D) Block some hosts from accessing the network

Answer: Option (D)

For more details you can refer ISRO | ISRO CS 2013 | Question 44 published
quiz.

Firewall in Computer Network Visit Course

Comment More info


Next Article
Placement Training Program Intrusion Detection System (IDS)

Similar Reads
Types of Network Firewall
Network Firewalls are the devices that are used to prevent private networks
from unauthorized access. A Firewall is a security solution for the computers o…

15+ min read

Firewall Design Principles


A Firewall is a hardware or software to prevent a private computer or a
network of computers from unauthorized access, it acts as a filter to avoid…

15+ min read

Intrusion Detection System (IDS)


Intrusion is when an attacker gets unauthorized access to a device, network, or
system. Cyber criminals use advanced techniques to sneak into organizations…

15+ min read

The Importance of Using a Firewall


Overview :A firewall is a firmware or software that is an essential part of a
computer network’s security system. In simple terms, it acts as an intermediar…

15+ min read

Difference Between Hardware Firewall and Software Firewall


A firewall is a network security system or shielding layer that lies between the
internet and the computer networks. A firewall typically set up a barrier…

15+ min read

Basics of Computer Networking


A computer network is a collection of interconnected devices that share
resources and information. These devices can include computers, servers,…

15+ min read

Introduction of a Router
Network devices are physical devices that allow hardware on a computer
network to communicate and interact with one another. For example Repeater…

15+ min read


Intruders in Network Security
In network security, "intruders" are unauthorized individuals or entities who
want to obtain access to a network or system to breach its security. Intruders…

15+ min read

Network and Communication


Networks and communication involve connecting different systems and devices
to share data and information. This setup includes hardware like computers,…

15+ min read

Types of Switches in Computer Network


Switches in computer networks are devices that connect multiple devices (like
computers, and printers) within a network. They manage data traffic efficientl…

15+ min read

Corporate & Communications Address:


A-143, 7th Floor, Sovereign Corporate
Tower, Sector- 136, Noida, Uttar Pradesh
(201305)

Registered Address:
K 061, Tower K, Gulshan Vivante
Apartment, Sector 137, Noida, Gautam
Buddh Nagar, Uttar Pradesh, 201305

Advertise with us

Company Explore Languages DSA Data Science & Web


About Us Job-A-Thon Hiring Python Data Structures ML Technologies
Legal Challenge Java Algorithms Data Science With HTML
Privacy Policy C++ DSA for Beginners Python CSS
Careers GfG Weekly PHP Basic DSA Data Science For JavaScript
In Media Contest GoLang Problems Beginner TypeScript
Contact Us Offline Classroom SQL DSA Roadmap Machine Learning ReactJS
GfG Corporate Program R Language DSA Interview ML Maths NextJS
Solution DSA in JAVA/C++ Android Tutorial Questions Data Visualisation NodeJs
Placement Master System Competitive Pandas Bootstrap
Training Program Design Programming NumPy Tailwind CSS
Master CP NLP
GeeksforGeeks Deep Learning
Videos

Python Computer DevOps System Design School Databases


Tutorial Science Git High Level Design Subjects SQL
Python GATE CS Notes AWS Low Level Design Mathematics MYSQL
Programming Operating Systems Docker UML Diagrams Physics PostgreSQL
Examples Computer Kubernetes Interview Guide Chemistry PL/SQL
Django Tutorial Network Azure Design Patterns Biology MongoDB
Python Projects Database GCP OOAD Social Science
Python Tkinter Management DevOps Roadmap System Design English Grammar
Web Scraping System Bootcamp
OpenCV Tutorial Software Interview
Python Interview Engineering Questions
Question Digital Logic
Design
Engineering Maths

Preparation More Tutorials Machine Programming Clouds/ GATE 2026


Corner Software Learning/Data Languages Devops GATE CS Rank
Development Booster
Company-Wise Science C Programming DevOps
Recruitment Software Testing with Data Engineering GATE DA Rank
Complete Machine
Process Product Structures AWS Solutions Booster
Learning & Data
Aptitude Management C++ Programming Architect GATE CS & IT
Science Program -
Preparation Project Course Certification Course - 2026
[LIVE]
Puzzles Management Java Programming Salesforce GATE DA Course
Data Analytics
Company-Wise Linux Course Certified 2026
Training using
Preparation Excel Python Full Course Administrator GATE Rank
Excel, SQL, Python
All Cheat Sheets Course Predictor
& PowerBI - [LIVE]
Data Science
Training Program -
[LIVE]
Data Science
Course with IBM
Certification

@GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved

You might also like