close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Network Security: Firewall, Its Types, Advantages and Disadvantages

downloadDownload printPrint

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

blank-ico
Download PDF

Abstract

One of the most important tools used to secure networks is firewalls. A firewall can be hardware or software. It filters all network traffic to prevent unauthorized access between computer networks. Other types of network security are access control, antivirus and antimalware, data loss prevention, email security, web security and wireless security. Traditional packet filters, application gateway, and stateful packet filters are used to achieve this defense. Individually, all the filters works in a various way to filter and control traffic. Some of firewall requisite are that all communications will go through the firewall, the firewall permits access to information that has been authorized, the firewall can bear attacks at the time of an attack, block outgoing network traffic based on source or destination IP addresses and blocking network traffic based on content. As of currently, a couple major companies like, Cisco and Check Point are two of the top firewall vendors around.

Introduction

In 2013, Yahoo was one of the major companies to have a data breaches in the 21st century. Businesses need firewalls. Firewall protection is for anybody. There are personal, small organization and enterprise organization firewalls. What is your data worth to you? It is important to organizations to protect lost data, confidential data and staff time. The three main firewall categories are traditional packet filters, application gateways, and stateful packet filters. This paper will be going over network security, specifically firewalls, the different types of firewalls and the advantages and disadvantages of each packet filters.

Traditional Packet Filters

A traditional packet filter is the most basic filter out of the three presented. It reviews every single datagram one at a time. It decides on whether to prevent data from passing or allow data to pass based on “administrator-specific” rules. In other words it provides network security by sorting network communication established on the information enclosed in TCP/IP headers of each packet. In the network layer of the OSI model use data used by packet filters contains destination port and protocols, source port, , destination IP addressed and source IP address. A couple protocol types are TCP and UDP. Packet filters can be executed using the access control lists, which are frequently established on most routers. One advantage is the performance; traditional packets process information only on one layer, which is enhancing efficiency and makes them very fast. The second advantage is that it is cost efficient. Lastly, traditional packet filters are good for transferring management. However, a disadvantage is that packet filters do not track the TCP session material created when clients communicate with each other. As Mr. Dnaiel Newman says, “when initial communication with clients starts, it uses TCP, they perform a three-way handshake, which is used to establish the TCP session”. Since these sessions are not supervised by packet filters, the clients become easy target for spoofing to occur. The next packet filter reviewed is stateful packet filter.

Stateful Packet Filters

A Stateful filters actually track TCP connections, and use this knowledge to make filtering decisions. A stateful packet filters firewall permits and denies packets based on a set of rules very that similar to traditional packet filter. This firewall watches the progress of each communications session from beginning to end and applies a set rules centered on the source, protocol, destination address and port. It analyzes records to confirm connection requests happen in the appropriate arrangement. The firewall also keeps every single communications session from beginning to end and implements set rules based on protocol, port and source and destination addresses. Some advantages are it can distinguish between valid and falsified ACK packets and the capability to look into the records of certain packet types. Some of the disadvantages of stateful packet fitters is it allows direct connections between untrusted and trusted hosts. The next packet filter discussed will be application gateway.

Application Gateway

An application gateway, also known as proxy filter, is an application-specific server through which all application data (inbound and outbound) must pass. To clarify, an application gateway makes access assessments established on packet information at all seven layers of OSI model. It sits between the client and the destination functioning as a middleman between the two collaborating parties. It requires the client to establish a session with the application itself, which in turn creates a second session between itself and the destination. Some advantages are application gateways provide a higher level of security that traditional packet filters do as well. Some disadvantages are slower performance, Lack of performance, it can present speed and performance issues, specifically when a enormous number of sessions are being simultaneously negotiated.

Conclusion

In conclusion, an hardware or software firewall needs to be implemented. Many companies sell firewalls like, Cisco, Checkpoint, Sophos and WatchGuard. To keep your data safe, you need to have a firewall. This essay reviewed network security, specifically firewalls, the different types of firewalls and the advantages and disadvantages of each packet filters.

infoRemember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism-free

Sources and citations are provided

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

Network Security: Firewall, Its Types, Advantages And Disadvantages. (2020, July 14). GradesFixer. Retrieved July 24, 2021, from https://gradesfixer.com/free-essay-examples/network-security-firewall-its-types-advantages-and-disadvantages/
“Network Security: Firewall, Its Types, Advantages And Disadvantages.” GradesFixer, 14 Jul. 2020, gradesfixer.com/free-essay-examples/network-security-firewall-its-types-advantages-and-disadvantages/
Network Security: Firewall, Its Types, Advantages And Disadvantages. [online]. Available at: <https://gradesfixer.com/free-essay-examples/network-security-firewall-its-types-advantages-and-disadvantages/> [Accessed 24 Jul. 2021].
Network Security: Firewall, Its Types, Advantages And Disadvantages [Internet]. GradesFixer. 2020 Jul 14 [cited 2021 Jul 24]. Available from: https://gradesfixer.com/free-essay-examples/network-security-firewall-its-types-advantages-and-disadvantages/
copy to clipboard
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

    close

    Attention! This essay is not unique. You can get a 100% Plagiarism-FREE one in 30 sec

    Receive a 100% plagiarism-free essay on your email just for $4.99
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample
    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Your essay sample has been sent.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now
    boy

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer
    exit-popup-close

    Haven't found the right essay?

    Get an expert to write you the one you need!

    exit-popup-print

    Professional writers and researchers

    exit-popup-quotes

    Sources and citation are provided

    exit-popup-clock

    3 hour delivery

    exit-popup-persone