Firewalls

Firewalls are special protective software packages (firewalls) that prevent unauthorized virus-based Internet attacks, and also block both an individual computer and the entire local network from malicious Trojan programs. Based on their main purpose - not to skip suspicious packages, such programs received another name - filters. To date, the most famous manufacturers of security firewalls are the following: ZyXEL, Firewall, TrustPort Total Protection, ZoneAlarm, D-Link, Secure Computing, Watchguard Technologies.

Configure firewalls

Firewalls are manually configured, which provides the ability to set detailed protection. One of the most important features is to configure the antivirus directly on the USB port. Having set the necessary settings, using this program you can create full control over the input and output in the local network and in each electronic device in its composition.

By manually adjusting the protective screen on one of the network computers, you can quickly transfer the ready-made settings to other network units. Moreover, the synchronization of operation is ensured even with a wireless network connection. Setting the necessary parameters for the firewall to work takes some time, but if you neglect it, then the security restrictions may block some of the services necessary for the operation.

Additional Network Filter Features

There are firewalls that can be configured to provide additional protection for individual services and applications. For example, to prevent hacking "parental control" or to install "anti-spam." Setting up Internet access and operating rights in a closed local network for each program and application can be determined separately. A firewall allows you to control access to sites, can monitor gateway scans, and filter Web content. It is also able to block access from suspicious IP addresses, notify about attempts to attack or probe.

Types of Firewalls

Firewalls are divided into the following types:

- A traditional firewall that provides filtering access to send and receive packets;

- a session firewall that tracks individual sessions between installed applications, ensuring timely blocking of access to non-certified packets, which are used, as a rule, for hacking, scanning confidential data, etc .;

- an analytical firewall that performs filtering based on an analysis of the package’s internal information with subsequent blocking of the detected trojans;

- a hardware firewall equipped with a built-in accelerator that allows simultaneous intrusion prevention (IPS), anti-virus scanning, prevention of unauthorized user access within a private network, and VPN anonymity, as well as more efficient firewall operation.

Precautionary measures

To ensure high-quality and reliable network protection against unauthorized intrusions and hacks, it is necessary to install only a certified firewall on the network nodes. Currently, the legislative acts of the Russian Federation provide for certification of the FSTEC, Gazpromtsert and the FSB. For example, the FSTEC certificate certifies that this firewall meets all the requirements set forth in the first part of the document of the State Technical Commission of Russia. And the FSB certificates show that the system of protection programs complies with the Russian State Standard for the requirements of ensuring security and confidentiality of information.


All Articles