Tip & How-To about Computers & Internet

Firewall Configuration

A firewall is a type of security mechanism used for preventing security threat in both incoming and outgoing computer traffic. It protects your computer system and/or the private network from intrusions.
It acts as a barrier, which checks all the incoming and outgoing information to and from your computer or a network based on the firewall settings. Firewalls can be customized according to the level of security required. It filters the messages based on some conditions, such as the IP address, ports, protocols, domain names etc.
These can be implemented in the hardware, software or sometimes both and scan the entire messages passing through it and veriy whether each block or packet of the message meets the specified security criteria.
Some operating systems like Microsoft Windows offers built-in firewalls, which are by default turned on to block incoming threats from the Internet. You can also look for any third-party software or hardware firewall to replace the default Windows firewall.
Types of firewall
There are various types of firewalls like:
1. Packet filtering firewall
2. Application-level gateways
3. Circuit-level gateways
4. Hybrid firewall
The role of packet filtering firewall is to examine the information available in the header of the message packets. The Application-level gateway firewall works on the application layer of the protocol stack. It works in a more intelligent way as compared to the packet filtering firewall.
Mentioned below are some of the conditions, which help in adding or removing the filters from the firewall:
1. IP address: Every machine connected to Internet has a unique IP address. You can customize the firewall to block any IP address, if it seems to show an uneven or unauthorized attempt or nature.
2. Protocols: You can decide which protocols to be included in your firewall’s filters. Some of the commonly used protocols, which can be included in the firewall are: IP, HTTP, TCP, FTP, SMTP etc.
3. Ports: You can configure the firewall to allow or block any port number.
Similarly, there are various other conditions which can be used to configure the firewall.

Posted by on

Computers & Internet Logo

Related Topics:

Related Questions:

1 Answer

error 0x8007064c when installing windows live messenger on windows 7.


How to enable Windows Firewall when you receive an error code 0x80070643 or 0x800706d9 during Windows Live Essentials installation

Symptom:

Users are reporting installation issues when installing Windows Live Essentials.

You might receive one of the following error codes during the installation process: 0x800706d9, 0x80070643



Cause:

When Windows Firewall is disabled, installation of Windows Live Essentials could fail in some cases, because some Windows Live Essentials components require Windows Firewall to be enabled in order to install successfully.

Background information:

Windows Firewall is a software based solution to filter incoming and outgoing traffic of your computer or network. All traffic to and from your computer pass through Windows Firewall, which inspect all types of traffic and either allow or deny traffic depending upon the firewall settings. Microsoft includes the built-in firewall feature in all latest Windows operating systems like Windows XP, Windows Vista and Windows 7


Resolution Steps:

To enable Windows Firewall in Windows Vista/7 please follow the steps:

Note: To use this feature, you will need to be logged into your computer with administration rights.
1. Click on Start button and then click on Control Panel option.
2. In Control Panel click on System and Security link to go next.
3. Click on the link Windows Firewall
4. On left side panel, click on Turn Windows Firewall on or off
5. Select Turn on Windows Firewall for all (Domain, Home and Public network)

Jun 11, 2011 | Microsoft Computers & Internet

1 Answer

Possible Virus


Spyware cause the same effect as general browser pop-ups but they are usually powered by Browser Helper Objects, ActiveX controls which attaches to Internet Explorer and contacts their servers without your knowledge. This not only means waste of internet bandwidth, but your private information may also be sent to someone. You need to treat any outgoing connection without your permission, as a security threat.
Along with your anti-virus software, you need to anti-spyware tools such as Ad-AwareSpybot Search & DestroySpyware Blaster at a bare minimum. You must update the pattern files before scanning just like what you do for your anti-virus software.

  • Use HOSTS file to block unwanted ad servers and sites that are known to spread malware
  • Increase your browser security settings. Visit the following link to learn how to protect the system from parasites.
Dealing with Unwanted Spyware, Parasites, Toolbars and Search Engines
(Site packed with full of security tips, advice to prevent parasites being installed)
  • Use an application-based firewall, such as Zone Alarm, Sygate etc. They alert you whenever an outgoing traffic by a new application is detected. By doing this, you are preventing dialers, Trojans accessing the internet. Give equal importance to the configuration of the firewall. Assume your firewall as the gatekeeper, and only allow programs that you want, to access the internet. You may then test the effectiveness of the Firewall (for inbound protection) using any of these websites. They scan your system for open ports and vulnerabilities and advice you what action to take.



Jun 23, 2008 | Computers & Internet

Not finding what you are looking for?

209 people viewed this tip

Ask a Question

Usually answered in minutes!

Top Computers & Internet Experts

Doctor PC
Doctor PC

Level 3 Expert

7733 Answers

kakima

Level 3 Expert

102366 Answers

David Payne
David Payne

Level 3 Expert

14161 Answers

Are you a Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Loading...