Firewall forms the first defense against malware attack on a system. It acts as a security guard scrutinizing inbound/outbound traffic from the web.
ACL (Access List)
The earlier adoption to firewall, they resided in the main router.
We know data passes digitally in the form of individual packets. They contain information such as source/destination address, data type, bandwidth etc.
ACL would compare each packet to a set of predefined rules, mainly in ascending order (rule1, rule 2...).
If a match is found, the connection is allowed, and no further check is done. If no rule is adhered, the packet is discarded.
But this provided only basic filtering, and ACL did not care about protocol type like http or https.
Also, once the rules were set, it cannot be redefined. To edit one would be to clear the existing set and start from scratch.
The era begins ...
Present firewall came into existence during the late 80s, and graphical user interface (GUI) in the 90s. Firewall basic working include
- Rule settings like ACL for packet tracking. They can be modified, without full erasure
- Can exist in the client side or the router.
- Permission set to who can access which system. For example, a sales team cannot access HR server, but an administrator can access both.
- Outgoing packets are less filtered compared to inbound ones.
- New: The packet is not yet identified in memory, presumed to be a recent connection.
- Established: The packet address pre exits and needs less filtering.
- Related: The packet is new but has a connection to an established one. Caution is exercised.
- Invalid: Rules don't apply or adhered, and packet is discarded
3. Application Layer Firewall
The reach extends to the application layer and is the most secure. The firewall forms a drawbridge between the internal network and the web. All traffic passes through it whether inbound or outbound. Features include
- IP address of internal network is concealed from view, like a VPN (Virtual Private Network).
- Any strike against the rules, and the packet gets discarded immediately.
- Keeps a cache of frequently visited websites for faster access. This increases speed and bandwidth.
They are also commonly known as proxy firewalls.
Other variants include software/hardware firewalls, cloud firewalls (Online) etc.
Limitations
- The initial setup is expensive specially for hardware firewalls.
- Even though they can block eaves dropping or certain malwares, firewalls are not a comprehensive security package. The end user needs to install antivirus software for advanced protection.
- Firewall limits their protection circle to a single network. Multiple connections need more of the same.
Additional Information
- https://www.fortinet.com/resources/cyberglossary/firewall#:~:text=A%20firewall%20is%20a%20network,network%20and%20untrusted%20external%20networks.
- https://www.cisco.com/site/us/en/learn/topics/security/what-is-a-firewall.html
Comments
Post a Comment