Vous êtes sur la page 1sur 3

Firewall networks main Istamal Kia jata hai.

Yeh computers or Private Networks ko Hacking Ssay Bachata


Hai. Jab Aap Internet per Koi Be website Dekhna Chatay Hain Ya Phir Chatting Karna Chatay hai to
Program Batata Hai Keh Yeh Program Socket Use Kar Rha Hai. Masal kay tor per Internet Explorer Port80
use Karta Hai. Jab be aap web site per jaingay to yeh pochey gaa. Firewall Key Do Kismain Hain

1. Software Firewall

2.Hardware Firewall

Software Friewall

Software Firewall Aak Software Hota Hai Jo Aap say Pochta Hai ka Kay Yeh Program Internet pay Jane ke
koshish kar rhai kai is Ijasa Hai ya Nhein. Zaida Ter loog Norton Ka yaan Macafee ka Firewall Istmal Karey
Hain.

Hardware Firewall

Hardware Firewall main Internet Cable modem yaan Telephone Line is Hardware main Attach Hoti Hay.
Phir Yeh Hardware Externally Computer key saath attach hota hai. Is ka software Bilcull Software
Firewall ke tarhaan Kam Karta Hai. Lakin Har Chese Phaley Firewall main Jati Hai Phir Internet main Yaan
Computer main.

Firewall

A firewall is a network security device that monitors incoming and outgoing network traffic and decides
whether to allow or block specific traffic based on a defined set of security rules. (Cisco)

A firewall is a network security system, either hardware- or software-based, that uses rules to control
incoming and outgoing network traffic.

A firewall acts as a barrier between a trusted network and an untrusted network. A firewall controls
access to the resources of a network through a positive control model. This means that the only traffic
allowed onto the network is defined in the firewall policy; all other traffic is denied.

OR

A firewall is a network security system designed to prevent unauthorized access to or from a private
network. Firewalls can be implemented in both hardware and software, or a combination of both.
Network firewalls are frequently used to prevent unauthorized Internet users from accessing private
networks connected to the Internet, especially intranets. All messages entering or leaving the intranet
pass through the firewall, which examines each message and blocks those that do not meet the
specified security criteria.

Hardware and Software Firewalls

Firewalls can be either hardware or software but the ideal configuration will consist of both. In addition
to limiting access to your computer and network, a firewall is also useful for allowing remote access to a
private network through secure authentication certificates and logins.

Hardware firewalls can be purchased as a stand-alone product but are also typically found in broadband
routers, and should be considered an important part of your system and network set-up. Most hardware
firewalls will have a minimum of four network ports to connect other computers, but for larger
networks, business networking firewall solutions are available.

Software firewalls are installed on your computer (like any software) and you can customize it allowing
you some control over its function and protection features. A software firewall will protect your
computer from outside attempts to control or gain access your computer.

Firewall Design Principles

Firewall is a security barrier between two networks that screens traffic coming in and out of the gate of
one network to accept or reject connections and services according to a set of rules.

For a firewall to be effective the design of the firewalls should be efficient. The various principles that
should be adopted while designing a firewall are as follows:

OR

Firewalls are the most effective when close to the host they are protecting.
Firewalls are one part of the security of a system. They can be helpful in protecting systems, but
are useless if other measures are not also taken.
Firewalls should interfere minimally with the network.

OR

A firewall is a dedicated hardware, or software or a combination of both, which inspects network traffic
passing through it, and denies or permits passage based on a set of rules.
OR

Internet connectivity is no longer an option for most organizations. However, while internet access
provides benefits to the organization, it enables the outside world to reach and interact with local
network assets. This creates the threat to the organization. While it is possible to equip each
workstation and server on the premises network with strong security features, such as intrusion
protection, this is not a practical approach. The alternative, increasingly accepted, is the firewall.

The firewall is inserted between the premise network and internet to establish a controlled link and to
erect an outer security wall or perimeter. The aim of this perimeter is to protect the premises network
from internet based attacks and to provide a single choke point where security and audit can be
imposed. The firewall can be a single computer system or a set of two or more systems that cooperate
to perform the firewall function.

Trusted systems

One way to enhance the ability of a system to defend against intruders and malicious programs is to
implement trusted system technology.

OR