As a positive, people are increasingly facilitated to share the necessary documents. But negatives, not everyone shares with a good cause. Some attempt to attack the computer as a hacker, spy on certain computer (espionage) for personal benefit, or even steal existing data in a computer.
To prevent such negative impacts, a firewall is required to control the communication system between two networks. In the article below, it will be explained in full about the definition of firewalls, firewall functions, and how the firewall works.
A Firewall can be defined as a specially designed system to prevent suspicious access from going into a private network. The Firewall itself can be either hardware or software, it can also consist of a combination of both.
The firewall itself is actually inspired by physical objects called firewalls installed in buildings to prevent the fire from the source. Firewalls for buildings are widely installed for example in apartment complexes. To separate two apartment units, a firewall is installed so that if fire fires do not rapidly propagate from one unit to another.
Because the firewall serves as a barrier with the outside world, then for one apartment unit that has four sides for example, must have a firewall installed at all four border points. If either side is not limited to firewalls while the other three sides are in a firewall, it will be futile to hold the flame that will spread rapidly. Similarly, the firewall for computers.
In order to function effectively, a firewall is required to meet certain standards, able to establish a ' safety fence ' around a private network, preventing unauthorized access and interference to existing documents or files On the user's computer. On the market, there are quite a lot of firewall products offered with varying functions. The difference between a firewall and the other is usually at how strict the security and selectivity of access, and the scope of protection on various layers of OSI (Open System Interconnection).
- As a network security post. All traffic that enters or exits the network must go through the firewall as a security post that will perform the checks. Any traffic occurs, the firewall will attempt to filter for traffic according to the specified security.
- Preventing valuable information from leaking without a good time. For this one function, many firewalls are installed for File Transfer Protocol (FTP), so any data traffic is controlled by the firewall. In this case, the firewall is useful to prevent users on the network from sending valuable confidential files to other parties.
- Log user activity. Each time you access the data, the network user will go through a firewall which then records it as a log files which can then be opened for the record to develop a security system. Firewalls are able to access log data while providing statistics regarding network usage.
- Modifying the coming Data package. It is also known as NAT (Network Address Translation). NAT is used to hide an IP adress, thus making its users can access the Internet without the public IP adress, which is often also called by the term IP masquerading.
- Preventing modification of other party Data. For example, in business dealings for information on financial statements, product specifications, and others that become confidential companies and will have a negative impact if the other party is known. The Firewall prevents the modification of these data so that it remains in a safe state.
How firewalls work
Basically, the firewall works by limiting the personal computer to the Internet. Firewalls work like security guards at home gates and identify visitors who come, while filtering out intruders who attempt to enter a personal computer. Firewalls work like a leading defense guard to withstand any hacking attempts that go into the computer.
Firewall technology is growing in the day. Previously, the firewall was working filtering the computer traffic by using IP addresses, port numbers, as well as protocols. As the development progresses, the firewall is now able to filter incoming data by first identifying the content of the message it brings. To regulate computer and Internet data transfer traffic, the firewall can use one or a combination of the following methods:
1. Packet Filtering
It is a way for firewalls to monitor incoming and outgoing packets, allowing them to pass or be suspended based on their Internet Protocol (IP) address, protocols, and port. Packet filtering is usually quite effectively used to withstand attacks from outside a LAN. Packet filtering is also called a static firewall.
During the occurrence of communication with the Internet network, packet that comes filtered and matched with the rules that have previously been made in building a firewall. If the data matches, then the data can be received and vice versa if it does not match the rules, then the data is rejected.
In the packet filtering method, the firewall checks the source and destination IP addresses. Packet transmission may use different applications and programs, so packet filtering also checks the source and destination protocols, such as UDP (User Datagram Protocol) and TCP (Transmission Control Protocol).
2. Stateful Inspection
Contrary to Packet Filtering, Stateful inspection is also known as dynamic firewalls. In a stateful inspection, the active connection status is monitored, then the info obtained will be used to determine whether a network packet can penetrate the firewall.
Large stateful inspections have replaced packet filtering. In the static firewall, only the header of the packet is checked, meaning a hacker can retrieve information through a firewall with a simple, i.e. indicating "reply" via the header.
While with dynamic firewall, a packet is analyzed into Lapisan-lapisannya, by recording IP address and also port number, so that security is more stringent than packet filtering. So that's a discussion on the definition of firewalls, firewall functions, and how firewalls work. Hopefully useful.