Firewalls-information security, Computer Network Security


A firewall in an information security program that prevents specific types of information from moving between the outside world and the inside world. The firewall may be a separate computer system; a software service running on existing router or server; or a separate network having supporting devices

Firewall Categorization Methods

Firewalls are categorized by processing mode, development era, or intended structure. The 5 processing modes in which firewalls can be categorized by are:

-Packet filtering
-Application gateways
-Circuit gateways
-MAC layer firewalls

Firewalls which are categorized by intended structure are residential or commercial grade, hardware based, software based, or appliance based devices.

Packet Filtering

A Packet filtering firewalls examine header information of data packets which come into a network for compliance with or violation of rules of the firewall’s database.

A packet filtering firewall installed on TCP/IP determines whether to deny or forward to next network connection. If a device finds a packet which matches a restriction, it stops the packet from traveling .The restrictions implemented are often based on combination of

-Internet Protocol (IP) source and destination address
-Direction (inbound/outbound)
-Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) source and destination port requests

Simple firewall models enforce rules designed to forbid packets with certain addresses or partial addresses. The 3 subsets of packet filtering firewalls are:-

-Static filtering requires that filtering rules governing how the firewall decides which packets are allowed and which are denied are developed and installed
-Dynamic filtering permits firewall to react to emergent event and update or create rules to deal with event. It only permits a particular packet with a source, destination and port address to enter through firewall.
-Stateful inspection called as stateful firewalls which keep track of each network connection between internal and external systems by using a state table. A state table tracks the state and context of each pocket. Stateful firewalls block incoming packets which are not responses to internal requests. Dynamic stateful filtering firewalls keep dynamic state table to make changes to the filtering rules. Figure given below shows how packets are filtered by using the Packet Filtering Router and Table given below shows an example of Firewall rules and formats.


    528_Firewalls-information security.png



       2472_Firewalls-information security 1.png

Posted Date: 10/9/2012 3:16:01 AM | Location : United States

Related Discussions:- Firewalls-information security, Assignment Help, Ask Question on Firewalls-information security, Get Answer, Expert's Help, Firewalls-information security Discussions

Write discussion on Firewalls-information security
Your posts are moderated
Related Questions
Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac

STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal

Public Key Infrastructure (PKI) It is integrated system of software, encryption methodologies, protocols, legal agreements, and 3rd-party services enabling users to communicate

TCP-RELIABLE TRANSPORT SERVICE INTRODUCTION:  TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP whe

Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

Q1 (15 marks, 5 marks each part): This question has three parts: In a short paragraph (200-300 words) explain the fundamentals of Packet Switching and how it works. In a short pa

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared

Question: (a) Explain briefly the PCI Control Objectives which enterprises must meet to be compliant with the Payment Card Industry Data Security Standard (PCI DSS). Specify a

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X 4 + X 3 + 1 (i) Encode the data bit sequence 00111011001 using po