FIREWALL (host base, network base and virtual)
It is a simple system designed to prevent unauthorized access to privet or personal network. Firewalls can be implemented in two types first in software and second in hardware in addition to this we can use the combination of both. It is also used to prevent unauthorized internet users from accessing privet networks which are connected to the internet.
What is network firewall?
It is a device which has access to secured LAN network to protect it from unauthorized access. It acts as a filter which blocks the incoming traffic from entering the LAN network and cause some attacks.
The important purpose of a firewall is to make a wall between a secured area (Higher security Zone / Inside Network) from a less secure area (Low security Zone / Outside Network) and to control communications between the two. It also controls inbound and outbound communications in full devices.
Where a non-secure Network such as Internet terminates at Enterprise premises as well as Internet would be communicating through secured LAN Network, it becomes a mandatory requirement. Actually, IT policy for corporate doesn’t allow this kind of communication until security posture in place with Firewall being the mainstay requirement.
1. PACKET FILTERING (TO PREVENT FROM MALICIOUS ATTACKS)
It follows the policy of Authorized and unauthorized traffic. If the Firewall sees authorized traffic as per configured policy, traffic canallow passing to access LAN resources. If the firewall sees that the packet is unauthorized, it discards the data. This works on the network layer and transport layer of the OSI model.
2. TRAFFIC LOGGING
From recording the information to packets that pass through or that it discards, this can provide you with a clean picture of the kind of traffic experienced. Some hostile activity to make access to resources may be blocked by the firewall. But this unauthorized access attempt will be recorded.
3. VIRUS AND TROJAN PROTECTION
Plethora’s of Network Firewalls nowadays are equipped with capability to boost and block unwanted programs and software’s from entering Network like Virus and Trojans. By this LAN asset protection is always up-to-date. For limited amount of time, it can block emails with viruses from infecting in your network or employees from visiting don’t wanted web sites. Some firewall appliances give antivirus protection at the perimeter of your network. Commonly Network firewalls in perimeter are capable to day to day update the list of well and malicious applications.
Its functionality has also been integrated with Routing devices. Some examples like:
Juniper SRX (300, 550, 650, 1400 etc.) Firewall and Routing both are integrated devices.
We can’t also undermine here the features, scalability and performance dedicated Firewall devices give in comparison to integrated hardware.
However, technical and Business requirement mainly governs the decision to adopt Dedicated Firewall on Integrated Firewall solution.
Difference between network-based firewall and Host based firewall
This type of firewall is a firewall device or service that gives network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment. Such as traditional network firewall, and virtual firewall inspects packets and uses security policy rules to block unauthorized communication between VMs. This type of firewall is frequently deployed as a software appliance.
How it works
It is an application or a network firewall service that gives packet filtering within a virtualized environment. This type of firewall manages and controls incoming and outgoing traffic. This done its work in conjunction with switches and servers same as a physical firewall.
A virtual firewall prevents an unapproved user from accessing and transmitting data and files and even prevents an organization’s employees from transferring any sensitive data or documents.
A virtual firewall works in two modes (ways):
Bridge mode as well as hypervisor mode. Such as traditional firewall system, first mode which is bridge mode works by diagnosing and monitoring all of a VM’s incoming and outgoing traffic. In second mode which is hypervisor mode, the virtual firewall operates in isolation (separation) from the physical network, residing in the core hypervisor kernel and managing the incoming and outgoing traffic of the VM.
Uses of virtual firewalls
Using this type of firewall in the cloud can aid to protect an organization’s cloud infrastructure and services by running in a virtual data center on a company’s own servers in an infrastructure as a service.Runs application on a virtual server and protects traffic going to, from and between applications in the cloud.
1.it will protect data by filtering and managing traffic flowing to or from the internet, in the virtual networks, or joining tenants to secure the virtual data center.
2. Securing the physical data center along extending a physical data center to the cloud. This is more applicable to organizations that are migrating applications to the cloud and need secure connectivity in the cloud and their local infrastructures.
3. Securing remote access due to offer the advanced access policy, filtering and connection management needed to give clients with access to the cloud network.
4. It is ensuring that data is subject to the same protective measures one would use with on-premises, hardware-based firewall.
5. Maintaining the main two factors which are integrity and confidentiality of applications and data by integrating with access control providers and offering a wide variety of granular, policy-based filtering tools.
If you liked the story and want to appreciate us you can clap as much as you can. Appreciate our work by your constructive comment and also you can connect to us on….
Website : https://www.societyofai.in/