Firewall(英文文献,适用于毕业设计)

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Firewall
A firewall is a software component that restricts unauthorized inward network access. It allows outward information flow. It is set up to control traffic flow between two networks by configured permissions like Allow, Deny, Block, Encrypt, etc. It is normally employed to avoid illegal access to personal computers or corporate networks from external unsafe entities like the Internet.
The firewall scrutinizes all the information flowing in and out of the network. If some data do not meet the necessary criterion, it is denied access into the network.
A firewall’s key function is to legalize the stream of traffic among computer networks of different trust levels. Similar to the physical firewalls installed in buildings that help limit the spread of fire, the software firewalls also help control network intrusions. A poorly configured firewall is useless. By default, the “deny” rule-set should be applied and allow only those applications to communicate for which the permissions have been explicitly set to “Allow.” However, such configurations require expertise understanding. Due to the lack of such expertise understanding, many corporate networks keep “Allow” as their default rule-set.
There are numerous firewall scrutiny techniques. An easy technique is to examine the incoming requests to make sure they arrive from trusted (formerly recognized) domain name and networks. Many companies develop firewall software. Firewall software features comprise of logging and reporting, routine alerts at specified points of intrusion, and a graphical user interface for managing the firewall software.
Types of Firewalls
The most basic firewall classifications falls into Hardware firewalls or Software firewalls. Hardware firewalls are considered external to the system, whereas Software firewalls are internal.
Hardware Firewalls-----Hardware firewalls are normally situated between the network and the connecting cable/modem. These are external hardware
devices usually called Network firewalls. Many a times, network devices
called ‘Routers’ include firewall security. Hardware firewalls provide a high
external defense level from intrusions since they are separate devices and
possess their own operating environment, offering an extra line of defense.
Software firewalls use becomes less important if a strong Hardware firewall
is implemented. The main fallback for Hardware firewall is they are quite
expensive when compared to Software firewalls.
∙Software Firewalls-----Software firewalls are basically software components that are internal to the computer system. They work hand-in-hand with the
computer’s operating system. Nowadays, many operating systems
areshipped with an inbuilt software firewall. Numerous firewall packages that various companies develop are on the market.
The disadvantage to software firewalls is that they will only guard the
computer they are installed on, not the entire network. Hence, it necessitates every computer to have a software firewall installed on it. They are
comparatively less expensive then the Hardware firewalls.
How Firewalls Work
Different kinds of firewalls function differently. They scrutinize, examine, and control the network traffic in numerous ways depending on their software architecture. Below are firewalls that work in different ways:
∙The Packet Filtering Firewall
One type of firewall is the packet filtering firewall. In a packet filtering
firewall, the firewall examines five packetcharacteristics:1. Source IP address
2.Source port
3.Destination IP address
4. Destination port
5. IP protocol (TCPor UDP)
Based upon rules configured into the firewall, the packet will either be
allowed through, rejected, or dropped. If the firewall rejects the packet, it
sends a message back to the sender letting him/her know that the packet
was rejected. If the packet was dropped, the firewall simply does not respond to the packet. The sender must wait for the communication to time out.
Dropping packets instead of rejecting them greatly increases the time
required to scan the network. Packet filtering firewalls operate on Layer 3 of
the OSI model, the Network Layer. Routers are a very common form of
packet filtering firewall.
An improved form of the packet filtering firewall is a packet filtering firewall with a state oriented inspection engine. With this enhancement, the firewall
“remembers” conversatio ns between systems and networks. It is then
necessary to fully examine only the conversation’s first packet.
∙The Application-Proxy Firewall
Another type of firewall is the application-proxy firewall. In a proxy based firewall, every packet is stopped at the proxy firewall. The packet is then
examined and compared to the rules configured into the firewall. If the
packet passes the examinations, it is recreated and sent out. Because each packet is destroyed and recreated, there is a potential that an
application-proxy firewall can prevent unknown attacks based upon
weaknesses in the TCP/IP protocol suite that a packet filtering firewall would not prevent. The drawback is that a separate application-proxy must be
written for each application type being proxy examined. An HTTP proxy for web traffic, an FTP proxy for file transfers, a Gopher proxy for Gopher traffic, and so on are needed. Application-proxy firewalls operate on Layer 7 of the OSI model, the Application Layer.
∙The Application-Gateway Firewall
Application-gateway firewalls also operate on Layer 7 of the OSI model, the Application Layer. Application-gateway firewalls exist for only few network applications. They intercept and examine all the information traveling from application to application. A typical application-gateway firewall is a system where the user must telnet to one system in order to telnet again to a system outside of the network.
∙The SOCKS Firewall
Another type of application-proxy firewall is the SOCKS firewall. Where
normal application-proxy firewalls do not require modifications to network clients, SOCKS firewalls require specially modified network clients. This
means users have to modify every system on their internal network that
needs to communicate with the external network. On a Windows or OS/2 system, this can be as easy as swapping a few DLLs.
-------------------------------------------------/firewall.html。

相关文档
最新文档