Network Firewall 4
Network Firewall 4
Network Firewall 4
Learning Objectives
Using the image below, on your thoughts discuss the importance of having a secured
network over the internet.
Presentation of Contents
Network firewalls are security devices used to stop or mitigate unauthorized access to private
networks connected to the Internet, especially intranets. The only traffic allowed on the network
is defined via firewall policies – any other traffic attempting to access the network is blocked.
Network firewalls sit at the front line of a network, acting as a communications liaison between
internal and external devices.
A network firewall can be configured so that any data entering or exiting the network has to pass
through it – it accomplishes this by examining each incoming message and rejecting those that
fail to meet the defined security criteria. When properly configured, a firewall allows users to
access any of the resources they need while simultaneously keeping out unwanted users, hackers,
viruses, worms or other malicious programs trying to access the protected network.
Hardware firewalls: These firewalls are released either as standalone products for
corporate use, or more often, as a built-in component of a router or other networking
device. They are considered an essential part of any traditional security system and
network configuration. Hardware firewalls will almost always come with a minimum of
four network ports that allow connections to multiple systems. For larger networks, a
more expansive networking firewall solution is available.
Software firewalls: These are installed on a computer, or provided by an OS or network
device manufacturer. They can be customized, and provide a smaller level of control over
functions and protection features. A software firewall can protect a system from standard
control and access attempts, but have trouble with more sophisticated network breaches.
Firewall Types
Firewalls are relied upon to secure home and corporate networks. A simple firewall program or
device will sift through all information passing through the network – this process can also be
customized depending on the needs of the user and the capabilities of the firewall. There are a
number of major firewall types that prevent harmful information from passing through the
network:
All of these network firewall types are useful for power users, and many firewalls will allow for
two or more of these techniques to be used in tandem with one another.
If your network is connected to the internet, some types of malware find ways to divert
portions of your hardware’s bandwidth for its own purposes.
Some types of malware are designed to gain access to your network to use sensitive
information such as credit card info, bank account numbers or other proprietary data like
customer information.
Other types of malware are designed to simply destroy data or bring networks down.
For full-spectrum security, firewalls should be placed between any network that has a connection
to the internet, and businesses should establish clear computer security plans, with policies on
external networks and data storage.
In the cloud era, network firewalls can do more than secure a network. They can also help ensure
that you have uninterrupted network availability and robust access to cloud-hosted applications.
Additional Discussion of Firewall using Mikrotik
Application