The course is part of this learning path
Firewalls and proxy servers
Three of the common types of firewalls are:
- Packet filtering
- Proxy servers
- Application firewalls
Most routers can perform stateless packet filtering, the simplest form of firewall. Stateful packet filtering is where the device maintains context about active sessions, using the stated information to control which packets pass through the device. If a packet is received for a connection that hasn’t already been set up, it’s rejected. This means the device understands which connections are currently active.
A device providing stateful packet filtering is considered as a firewall.
Static Packet Filter firewall will look at the header only. Deep packet inspection firewalls will look at the content and this will slow the process. However, it does provide a more reliable security filter.
A proxy server can either be dedicated hardware or software installed on a general-purpose machine. As you’ve seen, it acts as the client to the server and the server to the client. With this functionality a proxy server can, for example, protect a user's IP address from discovery by hackers.
Application firewalls understand the application traffic passing through them, so they work at a higher level than packet filtering firewalls. Rather than allowing or blocking connections according to the packet filtering rules, they inspect the traffic to see if it’s a permitted protocol; this is known as a deep packet inspection. E.g., Realtime Streaming Protocol (RTSP), BitTorrent or FTP could be blocked.
A firewall is an essential part of our network defence and that you may need to employ different types of firewalls, depending on the context. You have also learned that not only can a firewall limit and block threats, but it can also act as an auditing tool by providing logs of user communications. This can serve as an alert to unauthorised user behaviour, as well as being a useful metric in many different contexts.
What's next?
Now that you've been briefed on Firewalls in some detail, you're going to venture into looking at the De-Militarised Zone, or DMZ.
In this course you’ll take a deep dive into networks and communications controls, looking at Firewalls, DMZ and VPN among others.
A world-leading tech and digital skills organization, we help many of the world’s leading companies to build their tech and digital capabilities via our range of world-class training courses, reskilling bootcamps, work-based learning programs, and apprenticeships. We also create bespoke solutions, blending elements to meet specific client needs.