• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » General Basics of Firewall

By Abhishek Ghosh January 24, 2024 12:41 pm Updated on January 24, 2024

General Basics of Firewall

Advertisement

A firewall is a security system that protects a computer network or an individual computer from unwanted network access. More broadly, a firewall is also a sub-aspect of a security concept. Every firewall security system is based on a software component. Firewall software is designed to restrict network access based on the sender or destination and services used. It monitors the traffic passing through the firewall and decides whether or not to let certain network packets through based on set rules. In this way, it tries to prevent unauthorized network access.

Depending on where the firewall software is installed, a distinction is made between a personal firewall (also known as a desktop firewall) and an external firewall (also known as a network or hardware firewall). In contrast to the personal firewall, the software of an external firewall does not work on the system to be protected, but on a separate device that connects networks or network segments with each other and, thanks to the firewall software, simultaneously restricts access between the networks. In this case, “firewall” can also be used as a designation for the entire system (a device with the described function). Due to the design, there are major conceptual differences between the two types. The function of a firewall is not to detect attacks. It is only intended to implement rules for network communication. So-called IDS modules are responsible for detecting attacks, which are based on a firewall and can be part of the product. However, they are not part of the firewall module.

A firewall is used to prevent unwanted access to network services. It is based on the addresses of the communication partners (i.e. “who is allowed to access what”). As a rule, a firewall cannot prevent the exploitation of a vulnerability in the network service if the communication partner is allowed to access it.

Advertisement

---

General Basics of Firewall

When exploiting the return route, a firewall cannot protect against access to browser vulnerabilities if the communication partner can access the vulnerable areas of the program. Therefore, programs intended for network access should be kept up-to-date in order to close known security vulnerabilities there. Some firewalls offer filters that further restrict remote access to the network service being used, for example by filtering vulnerable ActiveX objects from web pages. The browser will then no longer be able to access (it will not display) such objects embedded in a web page, which at the same time means that it cannot be attacked via these objects. Alternatively, this behavior can also be achieved by configuring the browser you are using.

Depending on the type of firewall, a firewall can, in the best case, draw attention to the network access of secretly installed malware and sometimes even prevent its network access. However, such success is strongly dependent on the skill of the respective malware (see the limits of the personal firewall and the external firewall). Exploiting flaws in the operating system’s network implementation can fend off a firewall at its best.

The limitations of a firewall compared to its usefulness can be compared to the seat belt of an automobile, for which there are also scenarios in which it is unable to protect the driver. It makes sense to fasten the harness and at the same time drive carefully with the knowledge of your limits. An exception could be a seat belt that endangers the driver at the same time (in this case with reference to the Personal Firewall), which may lead to alternative solutions offering greater safety.

Only when it is known against which scenarios a certain level of security is to be achieved can one think about the way in which this is implemented. The creation of a security concept helps with this. Larger organizations usually have their own security policy in place for this purpose.

The firewall is one aspect of the security concept. Just as “fire protection” is a bundle of measures (and not just the smoke detector in the stairwell), this aspect can be a bundle of several measures, depending on the safety concept. The firewall can consist of several components, some of which power a DMZ, for example. Likewise, maintenance can be an integral part of the sub-aspect, as well as the evaluation of the logging of firewall components. Filtering techniques:

  1. Packet filter
  2. Stateful Packet Inspection
  3. Proxy
  4. Content filter
  5. Deep Packet Inspection
Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to General Basics of Firewall

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

  • WordPress & PHP : Different AdSense Units on Mobile Devices

    Here is How To Serve Different AdSense Units on Mobile Devices on WordPress With PHP. WordPress Has Function Which Can Be Used In Free Way.

  • How Can a Firewall can Protect Your Company?

    A firewall is your first line of defence against online threats, and it’s an important feature of any cybersecurity strategy. As a business owner, you need to be aware of the damage that cyberattacks can have against your business and ensure the right measures are in place to stop them. Firewalls are a useful tool […]

  • Changing Data With cURL for OpenStack Swift (HP Cloud CDN)

    Changing Data With cURL For Object is Quite Easy in OpenStack Swift. Here Are Examples With HP Cloud CDN To Make it Clear. Official Examples Are Bad.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

vpsdime

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cloud-Powered Play: How Streaming Tech is Reshaping Online GamesSeptember 3, 2025
  • How to Use Transcribed Texts for MarketingAugust 14, 2025
  • nRF7002 DK vs ESP32 – A Technical Comparison for Wireless IoT DesignJune 18, 2025
  • Principles of Non-Invasive Blood Glucose Measurement By Near Infrared (NIR)June 11, 2025
  • Continuous Non-Invasive Blood Glucose Measurements: Present Situation (May 2025)May 23, 2025
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2026 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy