[Home]History of Firewall

HomePage | Recent Changes | Preferences

Revision 11 . . December 16, 2001 3:02 am by (logged).150.138.xxx
Revision 10 . . (edit) December 16, 2001 2:55 am by (logged).150.138.xxx
Revision 9 . . (edit) December 11, 2001 9:48 am by Cpt [uhh, window-less not quite the whole story]
Revision 8 . . (edit) December 11, 2001 9:47 am by Cpt [correct IP address link]
Revision 7 . . December 11, 2001 12:27 am by Rjstott [*added explanation of proxy]
Revision 6 . . December 4, 2001 10:08 pm by Robbe [rewrote introduction; move paragraph that talks about network layer firewalls to that page]
Revision 5 . . (edit) December 4, 2001 8:24 pm by (logged).225.29.xxx [more info on external link]
Revision 4 . . (edit) December 4, 2001 6:38 pm by Arcade [*Corrected link to tcp/ip]
Revision 3 . . December 4, 2001 6:33 pm by Arcade [* Changed information about categories of firewalls.]
Revision 2 . . October 13, 2001 10:51 pm by Koyaanis Qatsi
  

Difference (from prior major revision) (author diff)

Changed: 3c3
Firewalls come in several categories and sub-categories. The basic goal is to prevent intrusion from a connected network -- the difference is in how they try to accomplish this. The two major categories of firewalls are network layer firewalls and application layer firewalls. The former operate at the (relatively low) level of the TCP/IP protocol stack as IP-packet filters, not allowing packets to pass the firewall unless they meet the rules defined by the firewall administrator or applied by default in some inflexible firewall systems. The latter work on the application level (ie, all browser traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or from an application. All other packets are blocked (usually dropped without acknowledment to the sender). In principle, application firewalls can prevent all unwanted outside traffic from reaching protected machines. By inspecting all otherwise allowed packets for improper content, they can even prevent such things as viruses. However, in practice, this is not easily achieved, and would be so difficult to attempt (given the variety of applications and the diversity of content each may allow in its packet traffic) that it is not generally attempted as a comprehensive firewall design. These two types of firewall are not mutuually exclusive and indeed have been implemented in a single system. pect the contents of packets, sanitize them, and so forth.
Firewalls come in several categories and sub-categories. The basic goal is to prevent intrusion from a connected network -- the difference is in how they try to accomplish this. The two major categories of firewalls are network layer firewalls and application layer firewalls. The former operate at the (relatively low) level of the TCP/IP protocol stack as an IP-packet filter, not allowing packets to pass the firewall unless they meet the rules defined by the firewall administrator or applied by default as in some inflexible firewall systems. The latter work on the application level (ie, all browser traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or from an application. Other packets are blocked (usually dropped without acknowledment to the sender). In principle, application firewalls can prevent all unwanted outside traffic from reaching protected machines. By inspecting all otherwise allowed packets for improper content, firewalls can even prevent such things as viruses. However, in practice, this is not easily achieved, and would be so difficult to attempt (given the variety of applications and the diversity of content each may allow in its packet traffic) that it is not generally attempted as a comprehensive firewall design. These two types of firewall are not mutuually exclusive and indeed have been implemented in a single system. By inspecting all otherwise allowed packets for improper content (a difficult tasking, to be sure) firewalls can even prevent such things as viruses and other unwelcome content.

Changed: 5c5,7
A proxy? device (running on either dedicated hardware or as software on a general purpose machine) may form a firewall by responding to input packets (eg, connection requests) in the manner of an application whilst rejecting all other packets. A proxy can also disguise the internal address, network and user structure of a computer network by translating IP addresses and thus preventing direct access to internal systems; this is sometimes called IP masquerading and it possible because the IETF has defined some 'Net addresses as not publically allowable (ie, they are private only and may be reused on private networks). In this way, tampering with an internal system is much more difficult from outside the private network and misuse of an internal system would not necessarily cause a security breach exploitable from outside the firewall (as long as the application proxy were intact and properly configured). Conversely, a hacker might hi-jack? a publically reachable system use it as a proxy for himself which then masquerades as that system as far as others are concerned.
A proxy? device (running on either dedicated hardware or as software on a general purpose machine) may act as a firewall by responding to input packets (eg, connection requests) in the manner of an application whilst blocking other packets. A proxy can also disguise the internal address, network, and user structure of a computer network by translating IP addresses and thus preventing direct access to internal systems; this is sometimes called IP masquerading and is possible because the IETF has defined some 'Net addresses as not publically allowable (ie, they are private only and may be reused on different private networks). In this way, tampering with an internal system is much more difficult from outside such a protected private network, and misuse of one of its internal systems would not necessarily cause a security breach exploitable from outside the firewall (as long as the application proxy were intact and properly configured). Conversely, a hacker might hi-jack? a publically reachable system use it as a proxy for himself which then masquerades as that system as far as others are concerned.

Proper configuration of firewalls is not simple. It requires considerable understanding of network protocols and of computer security. Small mistakes can render a firewall worthless as a security tool. Faith in misconfigured firewalls is misplaced indeed.

HomePage | Recent Changes | Preferences
Search: