Firewall | What is Firewall | Network Firewall | Hardware Firewall | Types of Firewall | Firewall Server | Firewall in Computer | Firewall Example | Firewall Tutorial

Firewall | What is Firewall | Network Firewall | Hardware Firewall | Types of Firewall | Firewall Server | Firewall in Computer | Firewall Example | Firewall Tutorial

Firewall | What is Firewall | Network Firewall | Hardware Firewall | Types of Firewall | Firewall Server | Firewall in Computer | Firewall Example | Firewall Tutorial

 



In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted.

Firewalls are often categorized as either network firewalls or host-based firewalls. Network firewalls filter traffic between two or more networks; they are either software appliances running on general purpose hardware, or hardware-based firewall computer appliances. Host-based firewalls provide a layer of software on one host that controls network traffic in and out of that single machine.

Firewall appliances may also offer other functionality to the internal network they protect, such as acting as a DHCP or VPN server for that network.

History




The term firewall originally referred to a wall intended to confine a fire or potential fire within a building. Later uses refer to similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment.

Types

An illustration of where a firewall would be located in a network

Firewalls are generally categorized as network-based or host-based. Network-based firewalls are positioned on the gateway computers of LANs, WANs, and intranets. Host-based firewalls are positioned on the network node itself. The host-based firewall may be a daemon or service as a part of the operating system or an agent application such as endpoint security or protection. Each has advantages and disadvantages. However, each has a role in layered security.

Thanks for reading the post and keep visits for more updates.





About Ashok.cse

Hi, I'm currently studying for the Bachelor of Technology In Computer Science from Rajasthan Technical University. I am the web developer with 3+ years of experience. my range of developer services including creating the design for new apps and web platforms or building UI design for mobile, tablets or desktops. making UX designs wireframes and layouts concepts and redesigns websites are adapting to mobile and responsive design. I have worked with many clients. I am working professionally with WordPress And Adobe tools.

View all posts by Ashok.cse →

Leave a Reply

Your email address will not be published. Required fields are marked *