Firewall
Firewall
Firewall
1. Packet filter: Packet filtering inspects each packet passing through the
network and accepts or rejects it based on user-defined rules. Although
difficult to configure, it is fairly effective and mostly transparent to its
users. It is susceptible to IP spoofing.
2. Application gateway: Applies security mechanisms to specific
applications, such as FTP and Telnet servers. This is very effective, but
can impose a performance degradation.
3. Circuit-level gateway: Applies security mechanisms when a TCP or
UDP connection is established. Once the connection has been made,
packets can flow between the hosts without further checking.
4. Proxy server: Intercepts all messages entering and leaving the
network. The proxy server effectively hides the true network addresses.
Function
Types
Network layer firewalls, also called packet filters, operate at a relatively low
level of the TCP/IP protocol stack, not allowing packets to pass through the
firewall unless they match the established rule set. The firewall
administrator may define the rules; or default rules may apply. The term
"packet filter" originated in the context of BSD operating systems.
Network layer firewalls generally fall into two sub-categories, stateful and
stateless. Stateful firewalls maintain context about active sessions, and use
that "state information" to speed packet processing. Any existing network
connection can be described by several properties, including source and
destination IP address, UDP or TCP ports, and the current stage of the
connection's lifetime (including session initiation, handshaking, data
transfer, or completion connection). If a packet does not match an existing
connection, it will be evaluated according to the ruleset for new connections.
If a packet matches an existing connection based on comparison with the
firewall's state table, it will be allowed to pass without further processing.
Stateless firewalls require less memory, and can be faster for simple filters
that require less time to filter than to look up a session. They may also be
necessary for filtering stateless network protocols that have no concept of a
session. However, they cannot make more complex decisions based on what
stage communications between hosts have reached.
Modern firewalls can filter traffic based on many packet attributes like
source IP address, source port, destination IP address or port, destination
service like WWW or FTP. They can filter based on protocols, TTL values,
netblock of originator, of the source, and many other attributes.
Commonly used packet filters on various versions of Unix are ipf (various),
ipfw (FreeBSD/Mac OS X), pf (OpenBSD, and all other BSDs),
iptables/ipchains (Linux).
Application-layer
Proxies