Chapter 4 - Firewalls
Chapter 4 - Firewalls
Chapter 4
Firewalls
Firewalls.
Computer Security
4.0. Introduction
A firewall forms a barrier through which the traffic going in each direction must pass. A firewall
A firewall may be designed to operate as a filter at the level of IP packets, or may operate at a
• Local area networks (LANs) interconnecting PCs and terminals to each other and the
mainframe.
• Internet connectivity, in which the various premises networks all hook into the Internet
a. All traffic from inside to outside, and vice versa, must pass through the firewall.
This is achieved by physically blocking all access to the local network except
b. Only authorized traffic, as defined by the local security policy, will be allowed to pass.
Various types of firewalls are used, which implement various types of security policies, as
This implies the use of a hardened system with a secured operating system. Trusted computer
systems are suitable for hosting a firewall and often required in government applications.
a. Service control: Determines the types of Internet services that can be accessed, inbound
or outbound. The firewall may filter traffic on the basis of IP address, protocol, or port
number; may provide proxy software that receives and interprets each service request
before passing it on; or may host the server software itself, such as a Web or mail service.
Computer Security
b. Direction control: Determines the direction in which particular service requests may be
c. User control: Controls access to a service according to which user is attempting to access
it. This feature is typically applied to users inside the firewall perimeter (local users).
d. Behavior control: Controls how particular services are used. For example, the firewall
may filter e-mail to eliminate spam, or it may enable external access to only a portion of
A firewall may act as a packet filter. It can operate as a positive filter, allowing to pass only packets
that meet specific criteria, or as a negative filter, rejecting any packet that meets certain criteria.
Depending on the type of firewall, it may examine one or more protocol headers in each packet,
the payload of each packet, or the pattern generated by a sequence of packets. In this section, we
A packet filtering firewall applies a set of rules to each incoming and outgoing IP packet and
then forwards or discards the packet. The firewall is typically configured to filter packets going
in both directions (from and to the internal network). Filtering rules are based on information
A stateful inspection packet firewall tightens up the rules for TCP traffic by creating a directory
of outbound TCP connections. There is an entry for each currently established connection. The
Computer Security
packet filter will now allow incoming traffic to high-numbered ports only for those packets that
traffic. The user contacts the gateway using a TCP/IP application, such as Telnet or FTP, and the
gateway asks the user for the name of the remote host to be accessed. When the user responds and
provides a valid user ID and authentication information, the gateway contacts the application on
the remote host and relays TCP segments containing the application data between the two
endpoints. If the gateway does not implement the proxy code for a specific application, the service
is not supported and cannot be forwarded across the firewall. Further, the gateway can be
configured to support only specific features of an application that the network administrator
A fourth type of firewall is the circuit-level gateway or circuit-level proxy. This can be a stand-
certain applications. As with an application gateway, a circuit-level gateway does not permit an
end-to-end TCP connection; rather, the gateway sets up two TCP connections, one between
itself and a TCP user on an inner host and one between itself and a TCP user on an outside host.
Once the two connections are established, the gateway typically relays TCP segments from one
connection to the other without examining the contents. The security function consists of
All of the benefits of firewall security start with the ability to monitor network traffic. Data
coming in and out of your systems creates opportunities for threats to compromise your
operations. By monitoring and analyzing network traffic, firewalls leverage preestablished rules
and filters to keep your systems protected. With a well-trained IT team, you can manage your
levels of protection based on what you see coming in and out through your firewall.
Nothing can shut your digital operations down faster and harder than a virus attack. With
hundreds of thousands of new threats developed every single day, it is vital that you put the
defenses in place to keep your systems healthy. One of the most visible benefits of firewalls is
the ability to control your system's entry points and stop virus attacks. The cost of damage from a
virus attack on your systems could be immeasurably high, depending on the type of virus.
c) Prevents Hacking
Unfortunately, the trend of businesses moving more toward digital operations invites thieves and
bad actors to do the same. With the rise of data theft and criminals holding systems hostage,
firewalls have become even more important, as they prevent hackers from gaining unauthorized
access to your data, emails, systems, and more. A firewall can stop a hacker completely or deter
d) Stops Spyware
In a data-driven world, a much-needed benefit is stopping spyware from gaining access and
getting into your systems. As systems become more complex and robust, the entry points
Computer Security
criminals can use to gain access to your systems also increase. One of the most common ways
infiltrate your systems, control your computers, and steal your data. Firewalls serve as an
e) Promotes Privacy
An overarching benefit is the promotion of privacy. By proactively working to keep your data
and your customers' data safe, you build an environment of privacy that your clients can trust.
No one likes their data stolen, especially when it is clear that steps could have been taken to
Review Questions.
2. List four techniques used by firewalls to control access and enforce a security policy.
5. What is the difference between a packet filtering firewall and a stateful inspection
firewall?
…end!