[cisb102sp04] cisb102 l3 q6 - firewall

  • From: Tom Spare <etspare@xxxxxxxxx>
  • To: lsitserv <cisb102sp04@xxxxxxxxxxxxx>
  • Date: Wed, 18 Feb 2004 12:25:16 -0800 (PST)

I have chosen to talk about firewalls for are sixth question of lesson 3.
 
With the increasing number of broadband connections and home networks the 
possibility of someone getting to your personal data is becoming more popular.  
There are many ways to help secure your data, one of them is by using a 
firewall*.
 
The purpose of firewalls are to control incoming and outgoing packets of 
information.  They act as Police officers, if you are good and behave the law 
then they will let you continue on but if they suspect something is wrong they 
will stop you.  Firewalls come in a wide variety.  They can be software or 
hardware based and can cost anywhere between $40 to many thousand of dollars.  
For the home user or small business you can usually purchase a router with a 
firewall built in that is easy to setup.  For the large companies you will 
usually have someone who is certified in routers and firewalls to secure your 
information.  I am a big believer of the Cisco (www.cisco.com) product line of 
routers and firewalls.  They are one of the largest companies for these 
devices.  Cisco publishes a book called the Cisco IOS Software Command Summary 
that is over 900 pages, it is nicknamed the "pocket guide" and it's not fully 
detailed on their command language.  If you wonder why you might need a
 firewall you can find a nice write up here 
http://www.cisco.com/univercd/cc/td/doc/product/iaabu/centri4/user/scf4ch2.htm.
 
 
*Firewall - A firewall is a set of related programs, located at a network 
gateway server, that protects the resources of a private network from users 
from other networks. Basically, a firewall, working closely with a router 
program, filters all network packets to determine whether to forward them 
toward their destination. A firewall is often installed away from the rest of 
the network so that no incoming request can get directly at private network 
resources. There are a number of firewall screening methods. A simple one is to 
screen requests to make sure they come from acceptable (previously identified) 
domain names and IP addresses. For mobile users, firewalls allow remote access 
in to the private network by the use of secure logon procedures and 
authentication certificates.  www.stallion.com/html/support/glossary.html
 


---------------------------------
Do you Yahoo!?
Yahoo! Mail SpamGuard - Read only the mail you want.


Other related posts: