Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

Firewall (computing)

Index Firewall (computing)

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. [1]

91 relations: Access control list, Air gap (networking), Application firewall, Bastion host, Bell Labs, Berkeley Software Distribution, Circuit-level gateway, Comparison of firewalls, Computer security, Computing, Cyberoam, Daemon (computing), De-perimeterisation, Deep packet inspection, Denial-of-service attack, Digital Equipment Corporation, Distributed firewall, Domain Name System, Dynamic Host Configuration Protocol, Egress filtering, End-to-end principle, Endpoint security, File Transfer Protocol, Firewall (construction), Firewall (engine), Firewall pinhole, Firewalls and Internet Security, FreeBSD, Golden Shield Project, Guard (information security), Hypertext Transfer Protocol, Identity management, Identity-based security, Internet, Internet Control Message Protocol, Internet protocol suite, Intranet, Intrusion detection system, IP address spoofing, IP fragmentation attack, Ipchains, IPFilter, Ipfirewall, Layered security, Linux, List of router and firewall distributions, List of TCP and UDP port numbers, Local area network, MacOS, Mandatory access control, ..., Mangled packet, NetBSD, Netfilter, Network address, Network address translation, Network monitoring, Network packet, Network security, Network traffic, Next-generation firewall, Node (networking), NPF (firewall), OpenBSD, Operating system, OSI model, Personal firewall, PF (firewall), Port (computer networking), Protocol stack, Red/black concept, Sandbox (computer security), Screened-subnet firewall, Security hacker, Software appliance, Spoofing attack, Stateful firewall, Steven M. Bellovin, Telnet, Transmission Control Protocol, Trusted Information Systems, Unidirectional network, Unix, User Datagram Protocol, Virtual firewall, Virtual private network, Vulnerability scanner, Web application firewall, Wide area network, William Cheswick, Windows Firewall, Windows service. Expand index (41 more) »

Access control list

An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object.

New!!: Firewall (computing) and Access control list · See more »

Air gap (networking)

An air gap, air wall or air gapping is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network.

New!!: Firewall (computing) and Air gap (networking) · See more »

Application firewall

An application firewall is a form of firewall that controls input, output, and/or access from, to, or by an application or service.

New!!: Firewall (computing) and Application firewall · See more »

Bastion host

A bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks.

New!!: Firewall (computing) and Bastion host · See more »

Bell Labs

Nokia Bell Labs (formerly named AT&T Bell Laboratories, Bell Telephone Laboratories and Bell Labs) is an American research and scientific development company, owned by Finnish company Nokia.

New!!: Firewall (computing) and Bell Labs · See more »

Berkeley Software Distribution

Berkeley Software Distribution (BSD) was a Unix operating system derivative developed and distributed by the Computer Systems Research Group (CSRG) of the University of California, Berkeley, from 1977 to 1995.

New!!: Firewall (computing) and Berkeley Software Distribution · See more »

Circuit-level gateway

A circuit-level gateway is a type of firewall.

New!!: Firewall (computing) and Circuit-level gateway · See more »

Comparison of firewalls

The following is a comparison of notable firewalls, starting from simple home firewalls up to the most sophisticated Enterprise-level firewalls.

New!!: Firewall (computing) and Comparison of firewalls · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Firewall (computing) and Computer security · See more »

Computing

Computing is any goal-oriented activity requiring, benefiting from, or creating computers.

New!!: Firewall (computing) and Computing · See more »

Cyberoam

Cyberoam Technologies, a Sophos Company, is a global Network Security appliances provider, with presence in more than 125 countries.

New!!: Firewall (computing) and Cyberoam · See more »

Daemon (computing)

In multitasking computer operating systems, a daemon is a computer program that runs as a background process, rather than being under the direct control of an interactive user.

New!!: Firewall (computing) and Daemon (computing) · See more »

De-perimeterisation

In information security, de-perimeterisation is the removal of a boundary between an organisation and the outside world.

New!!: Firewall (computing) and De-perimeterisation · See more »

Deep packet inspection

Deep packet inspection is a type of data processing that inspects in detail the data being sent over a computer network, and usually takes action by blocking, re-routing, or logging it accordingly.

New!!: Firewall (computing) and Deep packet inspection · See more »

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

New!!: Firewall (computing) and Denial-of-service attack · See more »

Digital Equipment Corporation

Digital Equipment Corporation, also known as DEC and using the trademark Digital, was a major American company in the computer industry from the 1950s to the 1990s.

New!!: Firewall (computing) and Digital Equipment Corporation · See more »

Distributed firewall

A firewall is a system or group of systems (router, proxy, or gateway) that implements a set of security rules to enforce access control between two networks to protect the "inside" network from the "outside" network.

New!!: Firewall (computing) and Distributed firewall · See more »

Domain Name System

The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network.

New!!: Firewall (computing) and Domain Name System · See more »

Dynamic Host Configuration Protocol

The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on UDP/IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks.

New!!: Firewall (computing) and Dynamic Host Configuration Protocol · See more »

Egress filtering

In computer networking, egress filtering is the practice of monitoring and potentially restricting the flow of information outbound from one network to another.

New!!: Firewall (computing) and Egress filtering · See more »

End-to-end principle

The end-to-end principle is a design framework in computer networking.

New!!: Firewall (computing) and End-to-end principle · See more »

Endpoint security

Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices.

New!!: Firewall (computing) and Endpoint security · See more »

File Transfer Protocol

The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.

New!!: Firewall (computing) and File Transfer Protocol · See more »

Firewall (construction)

A firewall is a fire-resistant barrier used to prevent the spread of fire for a prescribed period of time.

New!!: Firewall (computing) and Firewall (construction) · See more »

Firewall (engine)

In automotive engineering, the firewall is the part of the automobile body (unibody or body-on-frame) that separates the engine compartment from the passenger compartment (driver and passengers).

New!!: Firewall (computing) and Firewall (engine) · See more »

Firewall pinhole

In computer networking, a firewall pinhole is a port that is not protected by a firewall to allow a particular application to gain access to a service on a host in the network protected by the firewall.

New!!: Firewall (computing) and Firewall pinhole · See more »

Firewalls and Internet Security

Firewalls and Internet Security: Repelling the Wily Hacker, a 1994 book by William R. Cheswick and Steve Bellovin, helped define the concept of a network firewall.

New!!: Firewall (computing) and Firewalls and Internet Security · See more »

FreeBSD

FreeBSD is a free and open-source Unix-like operating system descended from Research Unix via the Berkeley Software Distribution (BSD).

New!!: Firewall (computing) and FreeBSD · See more »

Golden Shield Project

The Golden Shield Project, also named National Public Security Work Informational Project, is the Chinese nationwide network-security fundamental constructional project by the e-government of the People's Republic of China.

New!!: Firewall (computing) and Golden Shield Project · See more »

Guard (information security)

In information security, a guard is a device or system for allowing computers on otherwise separate networks to communicate, subject to configured constraints.

New!!: Firewall (computing) and Guard (information security) · See more »

Hypertext Transfer Protocol

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems.

New!!: Firewall (computing) and Hypertext Transfer Protocol · See more »

Identity management

Identity management, also known as identity and access management (IAM) is, in computer security, the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons".

New!!: Firewall (computing) and Identity management · See more »

Identity-based security

Identity-based security is an approach to control access to a digital product or service based on the authenticated identity of an individual.

New!!: Firewall (computing) and Identity-based security · See more »

Internet

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.

New!!: Firewall (computing) and Internet · See more »

Internet Control Message Protocol

The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite.

New!!: Firewall (computing) and Internet Control Message Protocol · See more »

Internet protocol suite

The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.

New!!: Firewall (computing) and Internet protocol suite · See more »

Intranet

An intranet is a private network accessible only to an organization's staff.

New!!: Firewall (computing) and Intranet · See more »

Intrusion detection system

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations.

New!!: Firewall (computing) and Intrusion detection system · See more »

IP address spoofing

In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a false source IP address, for the purpose of hiding the identity of the sender or impersonating another computing system.

New!!: Firewall (computing) and IP address spoofing · See more »

IP fragmentation attack

IP fragmentation is the process of breaking up a single Internet Protocol (IP) packet into multiple packets of smaller size.

New!!: Firewall (computing) and IP fragmentation attack · See more »

Ipchains

Linux IP Firewalling Chains, normally called ipchains, is free software to control the packet filter or firewall capabilities in the 2.2 series of Linux kernels.

New!!: Firewall (computing) and Ipchains · See more »

IPFilter

IPFilter (commonly referred to as ipf) is an open-source software package that provides firewall services and network address translation (NAT) for many Unix-like operating systems.

New!!: Firewall (computing) and IPFilter · See more »

Ipfirewall

ipfirewall or ipfw is a FreeBSD IP, stateful firewall, packet filter and traffic accounting facility.

New!!: Firewall (computing) and Ipfirewall · See more »

Layered security

Layered security, also known as layered defense, describes the practice of combining multiple mitigating security controls to protect resources and data.

New!!: Firewall (computing) and Layered security · See more »

Linux

Linux is a family of free and open-source software operating systems built around the Linux kernel.

New!!: Firewall (computing) and Linux · See more »

List of router and firewall distributions

This is a list of router and firewall distributions, which are operating systems designed for use as routers and/or firewalls.

New!!: Firewall (computing) and List of router and firewall distributions · See more »

List of TCP and UDP port numbers

This is a list of TCP and UDP port numbers used by protocols of the application layer of the Internet protocol suite for the establishment of host-to-host connectivity.

New!!: Firewall (computing) and List of TCP and UDP port numbers · See more »

Local area network

A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.

New!!: Firewall (computing) and Local area network · See more »

MacOS

macOS (previously and later) is a series of graphical operating systems developed and marketed by Apple Inc. since 2001.

New!!: Firewall (computing) and MacOS · See more »

Mandatory access control

In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.

New!!: Firewall (computing) and Mandatory access control · See more »

Mangled packet

In computer networking, a mangled or invalid packet is a packet — especially IP packet — that either lacks order or self-coherence, or contains code aimed to confuse or disrupt computers, firewalls, routers, or any service present on the network.

New!!: Firewall (computing) and Mangled packet · See more »

NetBSD

NetBSD is a free and open source Unix-like operating system that descends from Berkeley Software Distribution (BSD), a Research Unix derivative developed at the University of California, Berkeley.

New!!: Firewall (computing) and NetBSD · See more »

Netfilter

Netfilter is a framework provided by Linux that allows various networking-related operations to be implemented in the form of customized handlers.

New!!: Firewall (computing) and Netfilter · See more »

Network address

A network address is an identifier for a node or host on a telecommunications network.

New!!: Firewall (computing) and Network address · See more »

Network address translation

Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.

New!!: Firewall (computing) and Network address translation · See more »

Network monitoring

Network monitoring is the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator (via email, SMS or other alarms) in case of outages or other trouble.

New!!: Firewall (computing) and Network monitoring · See more »

Network packet

A network packet is a formatted unit of data carried by a packet-switched network.

New!!: Firewall (computing) and Network packet · See more »

Network security

Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

New!!: Firewall (computing) and Network security · See more »

Network traffic

Network traffic or data traffic is the amount of data moving across a network at a given point of time.

New!!: Firewall (computing) and Network traffic · See more »

Next-generation firewall

A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS).

New!!: Firewall (computing) and Next-generation firewall · See more »

Node (networking)

In telecommunications networks, a node (Latin nodus, ‘knot’) is either a redistribution point or a communication endpoint.

New!!: Firewall (computing) and Node (networking) · See more »

NPF (firewall)

NPF is a BSD licensed stateful packet filter, a central piece of software for firewalling.

New!!: Firewall (computing) and NPF (firewall) · See more »

OpenBSD

OpenBSD is a free and open-source Unix-like computer operating system descended from Berkeley Software Distribution (BSD), a Research Unix derivative developed at the University of California, Berkeley.

New!!: Firewall (computing) and OpenBSD · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: Firewall (computing) and Operating system · See more »

OSI model

The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology.

New!!: Firewall (computing) and OSI model · See more »

Personal firewall

A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy.

New!!: Firewall (computing) and Personal firewall · See more »

PF (firewall)

PF (Packet Filter, also written pf) is a BSD licensed stateful packet filter, a central piece of software for firewalling.

New!!: Firewall (computing) and PF (firewall) · See more »

Port (computer networking)

In computer networking, a port is an endpoint of communication in an operating system, which identifies a specific process or a type of network service running on that system.

New!!: Firewall (computing) and Port (computer networking) · See more »

Protocol stack

The protocol stack or network stack is an implementation of a computer networking protocol suite or protocol family.

New!!: Firewall (computing) and Protocol stack · See more »

Red/black concept

The red/black concept, sometimes called the red-black architecture or red/black engineering, refers to the careful segregation in cryptographic systems of signals that contain sensitive or classified plaintext information (red signals) from those that carry encrypted information, or ciphertext (black signals).

New!!: Firewall (computing) and Red/black concept · See more »

Sandbox (computer security)

In computer security, a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading.

New!!: Firewall (computing) and Sandbox (computer security) · See more »

Screened-subnet firewall

In network security, a screened subnet firewall is a variation of the dual-homed gateway and screened host firewall.

New!!: Firewall (computing) and Screened-subnet firewall · See more »

Security hacker

A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.

New!!: Firewall (computing) and Security hacker · See more »

Software appliance

A software appliance is a software application combined with just enough operating system (JeOS) to run optimally on industry-standard hardware (typically a server) or in a virtual machine.

New!!: Firewall (computing) and Software appliance · See more »

Spoofing attack

In the context of network security, a spoofing attack is a situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.

New!!: Firewall (computing) and Spoofing attack · See more »

Stateful firewall

In computing, a stateful firewall is a network firewall that tracks the operating state and characteristics of network connections traversing it.

New!!: Firewall (computing) and Stateful firewall · See more »

Steven M. Bellovin

Steven M. Bellovin is a researcher on computer networking and security.

New!!: Firewall (computing) and Steven M. Bellovin · See more »

Telnet

Telnet is a protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.

New!!: Firewall (computing) and Telnet · See more »

Transmission Control Protocol

The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite.

New!!: Firewall (computing) and Transmission Control Protocol · See more »

Trusted Information Systems

Trusted Information Systems (TIS) was a computer security research and development company during the 1980s and 1990s, performing computer and communications (information) security research for organizations such as NSA, DARPA, ARL, AFRL, SPAWAR, and others.

New!!: Firewall (computing) and Trusted Information Systems · See more »

Unidirectional network

A unidirectional network (also referred to as a unidirectional security gateway or data diode) is a network appliance or device allowing data to travel only in one direction, used in guaranteeing information security.

New!!: Firewall (computing) and Unidirectional network · See more »

Unix

Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: Firewall (computing) and Unix · See more »

User Datagram Protocol

In computer networking, the User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite.

New!!: Firewall (computing) and User Datagram Protocol · See more »

Virtual firewall

A virtual firewall (VF) is a network firewall service or appliance running entirely within a virtualized environment and which provides the usual packet filtering and monitoring provided via a physical network firewall.

New!!: Firewall (computing) and Virtual firewall · See more »

Virtual private network

A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

New!!: Firewall (computing) and Virtual private network · See more »

Vulnerability scanner

A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for known weaknesses.

New!!: Firewall (computing) and Vulnerability scanner · See more »

Web application firewall

A web application firewall (or WAF) filters, monitors, and blocks HTTP traffic to and from a web application.

New!!: Firewall (computing) and Web application firewall · See more »

Wide area network

A wide area network (WAN) is a telecommunications network or computer network that extends over a large geographical distance/place.

New!!: Firewall (computing) and Wide area network · See more »

William Cheswick

William R. "Bill" Cheswick (also known as "Ches") is a computer security and networking researcher.

New!!: Firewall (computing) and William Cheswick · See more »

Windows Firewall

Windows Firewall (officially called Windows Defender Firewall in Windows 10), is a firewall component of Microsoft Windows.

New!!: Firewall (computing) and Windows Firewall · See more »

Windows service

In Windows NT operating systems, a Windows service is a computer program that operates in the background.

New!!: Firewall (computing) and Windows service · See more »

Redirects here:

Computer firewall, Deep packet filtering, Firewall (computer), Firewall (networking), Firewall software, Host-based firewall, Network firewall, Network layer firewall, Packet filter, Packet filtering.

References

[1] https://en.wikipedia.org/wiki/Firewall_(computing)

OutgoingIncoming
Hey! We are on Facebook now! »