What Is a Firewall and How Does a Firewall Work?

2

As you begin to learn the essentials of computer and network security you will encounter many new terms: encryption, port, Trojan and more. Firewall will be a term that will appear again and again. So, what is a firewall?

What is a Firewall?

A firewall is basically the first line of defense for your network. The basic purpose of a firewall is to keep uninvited guests from browsing your network. A firewall can be a hardware device or a software application and generally is placed at the perimeter of the network to act as the gatekeeper for all incoming and outgoing traffic.

A firewall allows you to establish certain rules to determine what traffic should be allowed in or out of your private network. Depending on the type of firewall implemented you could restrict access to only certain IP addresses or domain names, or you can block certain types of traffic by blocking the TCP/IP ports they use.

How Does a Firewall Work?

There are basically four mechanisms used by firewalls to restrict traffic. One device or application may use more than one of these in conjunction with each other to provide more in-depth protection. The four mechanisms are packet-filtering, circuit-level gateway, proxy server and application gateway.

Packet Filter

A packet filter intercepts all traffic to and from the network and evaluates it against the rules you provide. Typically, the packet filter can assess the source IP address, source port, destination IP address and destination port. It is these criteria that you can filter on- allowing or disallowing traffic from certain IP addresses or on certain ports.

Circuit-Level Gateway

A circuit-level gateway blocks all incoming traffic to any host but itself.

Internally, the client machines run software to allow them to establish a connection with the circuit-level gateway machine. To the outside world, it appears that all communication from your internal network is actually originating from the circuit-level gateway.

Proxy Server

A proxy server is generally put in place to boost performance of the network, but can act as a sort of firewall as well. Proxy servers also hide your internal addresses as well so that all communications appear to originate from the proxy server itself. A proxy server will cache pages that have been requested. If User A goes to Yahoo.com the proxy server actually sends the request to Yahoo.com and retrieves the web page. If User B then connects to Yahoo.com the proxy server just sends the information it already retrieved for User A so it is returned much faster than having to get it from Yahoo.com again. You can configure a proxy server to block access to certain web sites and filter certain port traffic to protect your internal network.

Application Gateway

An application gateway is essentially another sort of proxy server. The internal client first establishes a connection with the application gateway. The application gateway determines if the connection should be allowed or not and then establishes a connection with the destination computer. All communications go through two connections- client to application gateway and application gateway to destination.

The application gateway monitors all traffic against its rules before deciding whether or not to forward it. As with the other proxy server types, the application gateway is the only address seen by the outside world so the internal network is protected.

Share.

About Author

Tony Bradley is a social media, community, and content marketing wizard–and also Editor-in-Chief of TechSpective. Tony has a passion for technology and gadgets–with a focus on Microsoft and security. He also loves spending time with his family and likes to think he enjoys reading and golf even though he never finds the time for either.

2 Comments

  1. Pingback: What Is a Firewall and How Does a Firewall Work? | Geek-Guy.com

  2. I read this article only out of sheer curiosity to see what your definition of a firewall could be. Your definition is true and designed for the layman but I don’t believe it is very accurate; let me restate, it was accurate once upon a time but today there are next generation firewalls which are the devices that stop your data from being stolen. I work for a next generation firewall company, who shall remain nameless, and I believe that your article needs a major upgrade. Ip Port based firewall policies, layer 3, are not an adequate form of protection, it’s kinda like have a screan door for protection. Next gen firewalls are application based, layer 7, and is far superior to layer 3 firewalling. Next gen firewalls also employ other protection in the kill chain model. So you definition was accurate 10 years ago but it is very much outdated and it is bothersome that outdated information is being distributed even for the layman.

Leave A Reply