Firewall (computing) explained

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.[1] [2] A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.[3]

History

The term firewall originally referred to a wall intended to confine a fire within a line of adjacent buildings.[4] Later uses refer to similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment. The term was applied in the 1980s to network technology[5] that emerged when the Internet was fairly new in terms of its global use and connectivity.[6] The predecessors to firewalls for network security were routers used in the 1980s. Because they already segregated networks, routers could apply filtering to packets crossing them.[7]

Before it was used in real-life computing, the term appeared in the 1983 computer-hacking movie WarGames, and possibly inspired its later use.[8]

One of the earliest commercially successful firewall and network address translation (NAT) products was the PIX (Private Internet eXchange) Firewall, invented in 1994 by Network Translation Inc., a startup founded and run by John Mayes. The PIX Firewall technology was coded by Brantley Coile as a consultant software developer.[9] Recognizing the emerging IPv4 address depletion problem, they designed the PIX to enable organizations to securely connect private networks to the public internet using a limited number of registered IP addresses. The innovative PIX solution quickly gained industry acclaim, earning the prestigious "Hot Product of the Year" award from Data Communications Magazine in January 1995. Cisco Systems, seeking to expand into the rapidly growing network security market, subsequently acquired Network Translation Inc. in November 1995 to obtain the rights to the PIX technology. The PIX became one of Cisco's flagship firewall product lines before eventually being succeeded by the Adaptive Security Appliance (ASA) platform introduced in 2005.

Types of firewall

Firewalls are categorized as a network-based or a host-based system. Network-based firewalls are positioned between two or more networks, typically between the local area network (LAN) and wide area network (WAN),[10] their basic function being to control the flow of data between connected networks. They are either a software appliance running on general-purpose hardware, a hardware appliance running on special-purpose hardware, or a virtual appliance running on a virtual host controlled by a hypervisor. Firewall appliances may also offer non-firewall functionality, such as DHCP[11] [12] or VPN[13] services. Host-based firewalls are deployed directly on the host itself to control network traffic or other computing resources.[14] [15] This can be a daemon or service as a part of the operating system or an agent application for protection.

Packet filter

The first reported type of network firewall is called a packet filter, which inspects packets transferred between computers. The firewall maintains an access-control list which dictates what packets will be looked at and what action should be applied, if any, with the default action set to silent discard. Three basic actions regarding the packet consist of a silent discard, discard with Internet Control Message Protocol or TCP reset response to the sender, and forward to the next hop.[16] Packets may be filtered by source and destination IP addresses, protocol, or source and destination ports. The bulk of Internet communication in 20th and early 21st century used either Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) in conjunction with well-known ports, enabling firewalls of that era to distinguish between specific types of traffic such as web browsing, remote printing, email transmission, and file transfers.[17] [18]

The first paper published on firewall technology was in 1987 when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls. At AT&T Bell Labs, Bill Cheswick and Steve Bellovin continued their research in packet filtering and developed a working model for their own company based on their original first-generation architecture.[19] In 1992, Steven McCanne andVan Jacobson released a paper on BSD Packet Filter (BPF) while at Lawrence Berkeley Laboratory.[20] [21]

Connection tracking

See main article: Stateful firewall.

From 1989–1990, three colleagues from AT&T Bell Laboratories, Dave Presotto, Janardan Sharma, and Kshitij Nigam, developed the second generation of firewalls, calling them circuit-level gateways.[22]

Second-generation firewalls perform the work of their first-generation predecessors but also maintain knowledge of specific conversations between endpoints by remembering which port number the two IP addresses are using at layer 4 (transport layer) of the OSI model for their conversation, allowing examination of the overall exchange between the nodes.[23]

Application layer

See main article: Application firewall.

Marcus Ranum, Wei Xu, and Peter Churchyard released an application firewall known as Firewall Toolkit (FWTK) in October 1993.[24] This became the basis for Gauntlet firewall at Trusted Information Systems.[25] [26]

The key benefit of application layer filtering is that it can understand certain applications and protocols such as File Transfer Protocol (FTP), Domain Name System (DNS), or Hypertext Transfer Protocol (HTTP). This allows it to identify unwanted applications or services using a non standard port, or detect if an allowed protocol is being abused.[27] It can also provide unified security management including enforced encrypted DNS and virtual private networking.[28] [29] [30]

As of 2012, the next-generation firewall provides a wider range of inspection at the application layer, extending deep packet inspection functionality to include, but is not limited to:

Endpoint specific

Endpoint-based application firewalls function by determining whether a process should accept any given connection. Application firewalls filter connections by examining the process ID of data packets against a rule set for the local process involved in the data transmission. Application firewalls accomplish their function by hooking into socket calls to filter the connections between the application layer and the lower layers. Application firewalls that hook into socket calls are also referred to as socket filters.

Most common firewall log types

Traffic Logs:

Threat Prevention Logs:

Audit Logs:

Event Logs:

Session Logs:

DDoS Mitigation Logs:

Geo-location Logs:

URL Filtering Logs:

User Activity Logs:

VPN Logs:

System Logs:

Compliance Logs:

Configuration

Setting up a firewall is a complex and error-prone task. A network may face security issues due to configuration errors.[32]

Firewall policy configuration is based on specific network type (e.g., public or private), and can be set up using firewall rules that either block or allow access to prevent potential attacks from hackers or malware.[33]

See also

External links

Notes and References

  1. Book: Noureddine . Boudriga . Security of mobile communications . limited . CRC Press . 2010 . Boca Raton . 32–33 . 978-0849379420.
  2. Macfarlane . Richard . Buchanan . William . Ekonomou . Elias . Uthmani . Omair . Fan . Lu . Lo . Owen . 2012 . Formal security policy implementations in network firewalls . Computers & Security . en . 31 . 2 . 253–270 . 10.1016/j.cose.2011.10.003.
  3. Oppliger. Rolf. Internet Security: FIREWALLS and BEYOND. Communications of the ACM. May 1997. 40. 5. 94. 10.1145/253769.253802. 15271915. free.
  4. Book: Canavan. John E.. Fundamentals of Network Security. 2001. Artech House. Boston, MA. 9781580531764. 212. 1st.
  5. Book: William R. . Cheswick . William Cheswick . Steven M. . Bellovin . Steven M. Bellovin . Firewalls and Internet Security

    Repelling The Wily Hacker

    . 1994 . Addison-Wesley . 978-0201633573 .
  6. Book: Liska. Allan. Building an Intelligence-Led Security Program. Dec 10, 2014. Syngress. 978-0128023709. 3.
  7. Web site: A History and Survey of Network Firewalls . 2002 . Ingham . Kenneth . Forrest . Stephanie . 2011-11-25 . https://web.archive.org/web/20060902171316/http://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf . 2006-09-02 . dead .
  8. Web site: Boren. Jacob. 2019-11-24. 10 Times '80s Sci-Fi Movies Predicted The Future. 2021-03-04. ScreenRant. en-US.
  9. Web site: Mayes. John. 2022-11-24. NTI - JMA. 2023-03-04. Wikipedia. en-US.
  10. Web site: Firewall . Sharanya . Naveen . 7 June 2016 . 21 May 2016 . https://web.archive.org/web/20160521201820/https://www.paloaltonetworks.com/documentation/glossary/what-is-a-firewall . dead .
  11. Web site: Firewall as a DHCP Server and Client. Palo Alto Networks. 2016-02-08.
  12. Web site: DHCP. www.shorewall.net. 2016-02-08.
  13. Web site: What is a VPN Firewall? – Definition from Techopedia. Techopedia.com. 2016-02-08.
  14. Book: John R. . Vacca . Computer and information security handbook . Elsevier . 2009 . Amsterdam . 355 . 9780080921945.
  15. Web site: What is Firewall?. 2015-02-12.
  16. Book: Peltier. Justin . Thomas R. . Peltier . Complete Guide to CISM Certification . 2007 . CRC Press . Hoboken . 9781420013252 . 210.
  17. Web site: TCP vs. UDP : The Difference Between them. www.skullbox.net. en. 2018-04-09.
  18. Book: William R. . Cheswick . Steven M.. Bellovin. Aviel D. . Rubin . 2003 . Firewalls and Internet Security repelling the wily hacker . Addison-Wesley Professional . 2 . 9780201634662.
  19. Web site: A History and Survey of Network Firewalls . 2002 . Ingham . Kenneth . Forrest . Stephanie . 4 . 2011-11-25 . https://web.archive.org/web/20060902171316/http://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf . 2006-09-02 . dead .
  20. Web site: The BSD Packet Filter: A New Architecture for User-level Packet Capture. Steven. McCanne. Van. Jacobson. 1992-12-19. https://web.archive.org/web/20000916155334/http://www.tcpdump.org/papers/bpf-usenix93.pdf. 2000-09-16. dead.
  21. Web site: The BSD Packet Filter: A New Architecture for User-level Packet Capture. Steven. McCanne. Van. Jacobson. January 1993. USENIX.
  22. Book: M. Afshar Alam. Tamanna Siddiqui. K. R. Seeja. Recent Developments in Computing and Its Applications. 2013. I. K. International Pvt Ltd. 978-93-80026-78-7. 513.
  23. Web site: Firewalls. MemeBridge. 13 June 2014.
  24. Web site: Firewall toolkit V1.0 release . 2018-12-28.
  25. Web site: This Week in Network Security History: The Firewall Toolkit . https://web.archive.org/web/20160429131516/http://blogs.gartner.com/john_pescatore/2008/10/02/this-week-in-network-security-history-the-firewall-toolkit/ . dead . April 29, 2016 . John Pescatore . October 2, 2008 . 2018-12-28.
  26. Web site: FWTK history. Marcus J. Ranum. Frederick Avolio.
  27. Web site: What is Layer 7? How Layer 7 of the Internet Works. Aug 29, 2020. Cloudflare.
  28. Web site: 5 Firewall Features you Must-Have. 2021-11-08. Check Point Software. en-US.
  29. Web site: Stanfield. Nathan. 2019-12-04. 11 Firewall Features You Can't Live Without. 2021-11-08. Stanfield IT. en-AU.
  30. Web site: Safing Portmaster. 2021-11-08. safing.io.
  31. Book: Evolution of Firewalls: Toward Securer Network Using Next Generation Firewall . 2024-02-02 . 2022 . 10.1109/CCWC54503.2022.9720435 . Liang . Junyan . Kim . Yoohwan . 0752–0759 . 978-1-6654-8303-2 .
  32. Voronkov. Artem. Iwaya. Leonardo Horn. Martucci. Leonardo A.. Lindskog. Stefan. 2018-01-12. Systematic Literature Review on Usability of Firewall Configuration. ACM Computing Surveys. 50. 6. 1–35. 10.1145/3130876. 6570517. 0360-0300.
  33. Web site: What is Firewall Configuration and Why is it Important?. Fortinet.