Types of Firewall and Firewall Important Software For PC


What is Firewall and it's Importance. Firewall is a software that authenticate the user and prevents your computer from malicious user

Firewall is a software that authenticate the user and prevents your computer from malicious user. It works as a wall to prevent and authenticate user. We can give access to any user and also restrict access from the firewall. Basically A firewall is a software designed to block unauthorized access from a computer network or computer system. It is a type of device or a group of devices designed to block an unauthorized network transmission according to certain rules and conditions. Only the user of the computer can permit the access of such connection.

Firewalls can be integrated in hardware or can be installed as software or can even work together in tandem. These are specially designed to protect private networks (intranets)so that information sent and received on these systems is not accessible to unauthorized internet users. All message packets passing through the network are filtered by the firewall and those not packets not meeting the defined security criteria are not allowed to pass through.

There are Many Types of Firewall:

Packet filter:-

In this type Data are sent in the form of packet. The firewall reads all these packets and accepts or rejects the packets according to the user's predefined rules. Though packet filtering is somewhat difficult to configure but even then is quite effective and transparent to the user. Packet filtering can be hoodwinked by IP spoofing.

Application Gateway:-

It applies security parameters to certain applications like telnet and FTP. It might lead to a bit degradation in the performance of your computer and will be a bigger headache for web designers but is quite effective.

Circuit level Gateway:-

When a TCP or UDP connection is made the firewall applies some security mechanism on it so that packets flow between the hosts without further checking.

Proxy server:-

Proxy server not only hides the actual network address but also incepts all the messages entering or leaving the network.


Related Articles

More articles: Computer

Comments

No responses found. Be the first to comment...


  • Do not include your name, "with regards" etc in the comment. Write detailed comment, relevant to the topic.
  • No HTML formatting and links to other web sites are allowed.
  • This is a strictly moderated site. Absolutely no spam allowed.
  • Name:
    Email: