Firewall & security technique

Image result for FirewallA firewall is a network security system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Network firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
Firewall Description
A firewall is considered to shelter your computer from assault by malevolent users or by spiteful software such as bugs that use spontaneous received network traffic to hit your computer. Before you stop your firewall, you must detach your computer from every part of networks, as well as the Internet. You can put into practice firewalls in software, hardware, or some time both. Firewalls are commonly used to avoid unconstitutional Internet users from accessing personal networks that are attached to the Internet.

Firewall Techniques
There are several firewall techniques and each firewall may use two or more than two techniques in concert.
  • Packet filters: – This firewall technique is observed the entering and discharging the network of each packet. Packets filters admit or discard it depend on user-defined rules. Packet filtering is quite efficient and transparent to users, but it is hard to build up. Packets filter used to liable to IP spoofing.
  • Application gateway: – Application gateway used to apply safety method to definite applications, such as Telnet and FTP servers. Application gateways are very effective, but can inflict presentation poverty.
  • Circuit-level gateway: – Circuit-level gateway is concerned to security device especially when UDP or TCP connection is going to establish. When connection comes visible then packets can run among the hosts without additional checking.
  • Proxy server:-Proxy server interrupts all messages incoming and outgoing the network. The proxy server successfully hides the true network addresses.