Firewall: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: {{subpages}} In computer networks, a '''firewall''' is a set of information security functions that may or may not reside in a single physical computer. Large or fault-tolerant net...) |
John Leach (talk | contribs) m (Text replacement - "{{subpages}}" to "{{PropDel}}<br><br>{{subpages}}") |
||
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
{{subpages}} | {{PropDel}}<br><br>{{subpages}} | ||
In [[computer network]]s, a '''firewall''' is a set of [[information security]] functions that may or may not reside in a single physical computer. Large or fault-tolerant networks have multiple firewalls. The functions control certain types of access to the protected network. Most often, we think of the attacks as coming from the [[Internet]], but firewalls have applications for internal networks — and not all secure access through the Internet goes through a firewall. | In [[computer network]]s, a '''firewall''' is a set of [[information security]] functions that may or may not reside in a single physical computer. Large or fault-tolerant networks have multiple firewalls. The functions control certain types of access to the protected network. Most often, we think of the attacks as coming from the [[Internet]], but firewalls have applications for internal networks — and not all secure access through the Internet goes through a firewall. | ||
Line 5: | Line 5: | ||
*[[Stateless packet filtering]] | *[[Stateless packet filtering]] | ||
*[[Stateful packet inspection]] | *[[Stateful packet inspection]] | ||
*[[Network address translation | *[[Network address translation]] | ||
*[[Proxy services]] | *[[Proxy services]] | ||
*[[Security logging]] | *[[Security logging]] | ||
Line 20: | Line 20: | ||
*Fraudulent authentication | *Fraudulent authentication | ||
*Human error | *Human error | ||
==Cooperating services== | |||
These may or may not share computers, although it is wise to have the minimum possible number of services on a firewall. | |||
*[[Authentication server]] | |||
*[[Split DNS]] | |||
*[[Network Intrusion Detection System]] | |||
*[[Host Intrusion Detection System]] | |||
*[[Honeypot]] | |||
*[[Screening router]] | |||
*[[Virtual Private Network]] concentrator | |||
*[[Network time server]] |
Latest revision as of 04:48, 8 April 2024
This article may be deleted soon. | ||
---|---|---|
In computer networks, a firewall is a set of information security functions that may or may not reside in a single physical computer. Large or fault-tolerant networks have multiple firewalls. The functions control certain types of access to the protected network. Most often, we think of the attacks as coming from the Internet, but firewalls have applications for internal networks — and not all secure access through the Internet goes through a firewall. Some basic firewall functions include:
What a firewall is not
Firewalls are not primary protection against
Cooperating servicesThese may or may not share computers, although it is wise to have the minimum possible number of services on a firewall. |