Introduction of Firewall in Computer Network _ GeeksforGeeks
Introduction of Firewall in Computer Network _ GeeksforGeeks
Full Stack Course HTML CSS JavaScript TypeScript jQuery AngularJS ReactJS Switch
Next.jsto Dark Mode
React Na
History of Firewalls
Late 1980s: Jeff Mogul, Brian Reid, and Paul Vixie at Digital Equipment
Corp (DEC) developed packet-filtering technology, laying the groundwork
for firewalls by checking external connections before they reached
internal networks.
Late 1980s – Early 1990s: AT&T Bell Labs researchers, including
Presotto, Sharma, and Nigam, developed the circuit-level gateway, a
firewall that vetted ongoing connections without reauthorizing each data
packet, paving the way for more efficient security.
1991-1992: Marcus Ranum introduced security proxies at DEC, leading to
the creation of the Secure External Access Link (SEAL), the first
commercially available application-layer firewall, based on earlier DEC
work.
1993-1994: At Check Point, Gil Shwed pioneered stateful inspection
technology, filing a patent in 1993. Nir Zuk developed a graphical
interface for Firewall-1, making firewalls accessible and widely adopted
by businesses and homes
Working of Firewall
Firewall match the network traffic against the rule set defined in its table.
Once the rule is matched, associate action is applied to the network
traffic. For example, Rules are defined as any employee from Human
Resources department cannot access the data from code server and at the
same time another rule is defined like system administrator can access the
data from both Human Resource and technical department.
Rules can be defined on the firewall based on the necessity and security
policies of the organization.
From the perspective of a server, network traffic can be either outgoing or
incoming. Firewall maintains a distinct set of rules for both the cases.
Mostly the outgoing traffic, originated from the server itself, allowed to
pass. Still, setting a rule on outgoing traffic is always better in order to
achieve more security and prevent unwanted communication. Incoming
traffic is treated differently.
Most traffic which reaches on the firewall is one of these three major
Transport Layer protocols- TCP, UDP or ICMP. All these types have a
source address and destination address. Also, TCP and UDP have port
numbers. ICMP uses type code instead of port number which identifies
purpose of that packet.
Default policy: It is very difficult to explicitly cover every possible rule on the
firewall. For this reason, the firewall must always have a default policy.
Default policy only consists of action (accept, reject or drop). Suppose no rule
is defined about SSH connection to the server on the firewall. So, it will
follow the default policy. If default policy on the firewall is set to accept, then
any computer outside of your office can establish an SSH connection to the
server. Therefore, setting default policy as drop (or reject) is always a good
practice.
Types of Firewall
Firewalls can be categorized based on their generation.
This works as the Sessions layer of the OSI Model’s . This allows for the
simultaneous setup of two Transmission Control Protocol (TCP) connections.
It can effortlessly allow data packets to flow without using quite a lot of
computing power. These firewalls are ineffective because they do not inspect
data packets; if malware is found in a data packet, they will permit it to pass
provided that TCP connections are established properly.
6. Software Firewall
7. Hardware Firewall
8. Cloud Firewall
Importance of Firewalls
So, what does a firewall do and why is it important? Without protection,
networks are vulnerable to any traffic trying to access your systems, whether
it’s harmful or not. That’s why it’s crucial to check all network traffic.
Once a malicious person finds your network, they can easily access and
threaten it, especially with constant internet connections.
For more details you can refer ISRO | ISRO CS 2013 | Question 44 published
quiz.
Similar Reads
Types of Network Firewall
Network Firewalls are the devices that are used to prevent private networks
from unauthorized access. A Firewall is a security solution for the computers o…
Introduction of a Router
Network devices are physical devices that allow hardware on a computer
network to communicate and interact with one another. For example Repeater…
Registered Address:
K 061, Tower K, Gulshan Vivante
Apartment, Sector 137, Noida, Gautam
Buddh Nagar, Uttar Pradesh, 201305
Advertise with us