In building construction, a firewall is a structure designed to contain building fires. As an illustration, an attic crawlspace that covers the whole length of the building would concede a fire to roar from one end of the building to the other. Breaking up the crawlspace with non-flammable walls helps to slow the disseminate of a fire.
Network firewalls have a similar function. A firewall is a network security strategy, either a program or a really device, that breaks up a network to comprise viruses and hackers.
Imagine two big fish tanks side by side, disunited by a wall. We want to allow the blue fish to mingle, but we need to keep the carnivorous fish on the left away from the baby fish on the proper. Whether or not we opened a computer-controlled door in the wall, programmed to only grant blue fish to pass but no one else, that would be a fishtank firewall.
Network firewalls 'segment" the network. Local traffic—the info that moves amongst the computers in that segment—doesn't go through the firewall to the more spectacular network outside. And selective information that doesn't require to reach anybody inside the firewall is blocked out, precisely like the carnivorous fish in our example.
A Proxy is another network security tool. Proxies are replacements for Internet servers. When a computer requests a internet-site from the net, a main hub provides the IP address. A firewall can interfere with this, and announce that no one inside the firewall may surf the Internet. The Proxy is then the "official" way past the firewall.
A free proxy server has a list of "authorized" web sites. When the user's computer requests the address from the Internet, the proxy checks it versus the list, and if the internet-site is approved, it authorizes the firewall to let the traffic through. If the internet site is not approved, then the firewall sends a message saying "you are not authorized to visit this web site. "
No comments:
Post a Comment