Firewalls are special protection software packages (firewalls) that prevent unauthorized virus Internet attacks, as well as creating a barrier to both the individual computer and the entire local network from the penetration of malicious Trojans. Based on their main purpose - not to miss suspicious packets, such programs received another name - filters. To date, the most famous manufacturers of security firewalls are the following: ZyXEL, Firewall, TrustPort Total Protection, ZoneAlarm, D-Link, Secure Computing, Watchguard Technologies.

Configuring Firewalls

Firewalls are configured manually, which allows for detailed installation of protection. One of the most important features is setting up the antivirus directly on the USB port. Having set the necessary settings, you can use this program to create full control over the input and output in the local network and in each electronic device in its composition.

By manually configuring the protection screen on one of the network computers, you can transfer the ready-made settings to other network units as soon as possible. Moreover, synchronization of operation is ensured even with a wireless network connection. Setting the necessary parameters for the firewall takes some time, but if you neglect it, then security restrictions can block some of the services you need to work.

Additional features of network filters

There are firewalls that can be configured to additionally protect individual services and applications. For example, to prevent the hacking of "parental control" or to establish "antispam". Setting up Internet access and operating rights in a closed local network for each program and application can be defined separately. The firewall allows you to control access to sites, can monitor the scanning of gateways, filter Web content. Also it is able to block access from suspicious IP-addresses, to notify of attempts of attack or sounding.

Types of internetwork firewalls

Firewalls are divided into the following types:

- a traditional firewall that provides filtering of packet sending and receiving access;

- a session firewall that monitors individual sessions between installed applications, providing timely closure of access to uncertified packets, used, as a rule, for hacking, scanning confidential data, etc .;

- an analytical firewall that filters on the basis of an analysis of the packet's internal information, followed by blocking of detected Trojans;

- A hardware firewall equipped with a built-in accelerator that allows simultaneous intrusion prevention (IPS), anti-virus scanning, prevention of unauthorized access of users within a private network, and VPN anonymity, and also perform firewall operations more efficiently.

Precautionary measures

To guarantee the provision of high-quality and reliable network protection against unauthorized intrusions and intrusions, it is necessary to install only a certified firewall on the network nodes. At the moment, the RF legislative acts provide for the certification of FSTEC, Gazpromsert and FSB. For example, the certificate of FSTEC certifies that this firewall meets all the requirements set out in the first part of the document of the State Technical Commission of Russia. And FSB certificates show that the system of protection programs corresponds to the Russian State Standard for the requirements of ensuring the security and confidentiality of information.

Similar articles





Trending Now






Copyright © 2018 Theme powered by WordPress.