How Firewalls Work
Firewalls use rules to examine network packets as they pass through a particular location on a network. If a packet does not contravene any of the firewall’s rules, the firewall will allow the packet through to its destination. However, a packet that breaks a firewall rule – for example, by originating from a host that has been blocked from sending traffic to the network – will be discarded.
Security Benefits
Firewalls provide markedly increased security for computers and other devices, especially on networks that are connected to the Internet. Without firewall software, it would be very easy for attackers to send malicious programs to your computer over a network, drastically increasing the load on your computer’s anti-virus and anti-malware programs. With a firewall in place, however, you can dictate exactly what the computers on your network are able to send and receive from the outside world, helping you to cut threats off at their source.
Monitoring With Firewalls
Firewall logging is the process of monitoring network traffic through a firewall. By definition, firewalls need to examine network packets closely as those packets pass by. Some firewalls can compile logs using the information that they gain from these packets, noting parameters such as the packet’s destination, source and size. These logs can then be used to help determine network conditions, including which areas of the network are busiest and which network applications consume the most data.
Enforcing Policies
Many networks have policies regarding which users can access data. For example, a school would likely prevent all of its computers from accessing adult content, while a home user might limit the amount of time that her children could use the Internet. Firewalls allow users to actively enforce these policies by creating specific rules. As such, the school might create a firewall rule blocking all content containing certain keywords, while the home user might create a rule blocking all Internet traffic from her children’s computer user accounts, except at specific times. Writer Bio
