Firewall Assignment
Firewall Assignment
Firewall Assignment
Software Friewall
Software Firewall Aak Software Hota Hai Jo Aap say Pochta Hai ka Kay Yeh Program
Internet pay Jane ke koshish kar rhai kai is Ijasa Hai ya Nhein. Zaida Ter loog Norton
Ka yaan Macafee ka Firewall Istmal Karey Hain.
Hardware Firewall
Hardware Firewall main Internet Cable modem yaan Telephone Line is Hardware
main Attach Hoti Hay. Phir Yeh Hardware Externally Computer key saath attach hota
hai. Is ka software Bilcull Software Firewall ke tarhaan Kam Karta Hai. Lakin Har
Chese Phaley Firewall main Jati Hai Phir Internet main Yaan Computer main.
Firewall
A firewall is a network security device that monitors incoming and outgoing network
traffic and decides whether to allow or block specific traffic based on a defined set
of security rules. (Cisco)
Firewalls can be either hardware or software but the ideal configuration will consist
of both. In addition to limiting access to your computer and network, a firewall is
also useful for allowing remote access to a private network through secure
authentication certificates and logins.
Hardware firewalls can be purchased as a stand-alone product but are also typically
found in broadband routers, and should be considered an important part of your
system and network set-up. Most hardware firewalls will have a minimum of four
network ports to connect other computers, but for larger networks, business
networking firewall solutions are available.
Software firewalls are installed on your computer (like any software) and you can
customize it allowing you some control over its function and protection features. A
software firewall will protect your computer from outside attempts to control or gain
access your computer.
Application Gateway
Applies security mechanisms to specific applications, such as FTP and Telnet
servers. This is very effective, but can impose a performance degradation.
Circuit-level Gateway
Applies security mechanisms when a TCP or UDP connection is established. Once
the connection has been made, packets can flow between the hosts without further
checking.
Proxy Server
Intercepts all messages entering and leaving the network. The proxy server
effectively hides the true network addresses.
In practice, many firewalls use two or more of these techniques in concert. A firewall
is considered a first line of defense in protecting private information. For greater
security, data can be encrypted.
OR
Firewall Types
Proxy firewall
An early type of firewall device, a proxy firewall serves as the gateway from one
network to another for a specific application. Proxy servers can provide additional
functionality such as content caching and security by preventing direct connections
from outside the network. However, this also may impact throughput capabilities
and the applications they can support.
Firewalls have evolved beyond simple packet filtering and Stateful inspection. Most
companies are deploying next-generation firewalls to block modern threats such as
advanced malware and application-layer attacks.
Threat-focused NGFW
These firewalls include all the capabilities of a traditional NGFW and also provide
advanced threat detection and remediation. With a threat-focused NGFW you can:
Know which assets are most at risk with complete context awareness
Quickly react to attacks with intelligent security automation that sets policies and
hardens your defenses dynamically
Better detect evasive or suspicious activity with network and endpoint event
correlation
Greatly decrease the time from detection to cleanup with retrospective security that
continuously monitors for suspicious activity and behavior even after initial
inspection
Ease administration and reduce complexity with unified policies that protect across
the entire attack continuum