Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

What is the use of firewall in Cisco? How many types of Firewalls?

user-image
Question added by Giddaluru Satheesh Kumar , Network Engineer , Pegasus International Computer Co.W.L.L
Date Posted: 2016/07/24
Faseeh Mohd koya
by Faseeh Mohd koya , IT SUPPORT ENGINEER [L2] , Ministry of Sports and Youth

A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet. 

Proxy firewall-An early type of firewall device, a proxy firewall serves as the gateway from one network to another for a specific application. Proxy servers can provide additional functionality such as content caching and security by preventing direct connections from outside the network. However, this also may impact throughput capabilities and the applications they can support.

Stateful inspection firewall-Now thought of as a “traditional” firewall, a stateful inspection firewall allows or blocks traffic based on state, port, and protocol. It monitors all activity from the opening of a connection until it is closed. Filtering decisions are made based on both administrator-defined rules as well as context, which refers to using information from previous connections and packets belonging to the same connection.

Unified threat management (UTM) firewall-A UTM device typically combines, in a loosely coupled way, the functions of a stateful inspection firewall with intrusion prevention and antivirus. It may also include additional services and often cloud management. UTMs focus on simplicity and ease of use.

Anirban Chakraborty
by Anirban Chakraborty , Network Administrator , Wipro Limited

A firewall is a network security system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both.

Network firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

Types of Firewall in CISCO

1. Proxy Firewals : - An early type of firewall device, a proxy firewall serves as the gateway from one network to another for a specific application.

2. Stateful inspection firewall : - Now thought of as a “traditional” firewall, a stateful inspection firewall allows or blocks traffic based on state, port, and protocol. It monitors all activity from the opening of a connection until it is closed.

3. Unified threat management (UTM) firewall: - A UTM device typically combines, in a loosely coupled way, the functions of a stateful inspection firewall with intrusion prevention and antivirus. It may also include additional services and often cloud management. UTMs focus on simplicity and ease of use.

4. Next-generation firewall (NGFW) : - Firewalls have evolved beyond simple packet filtering and stateful inspection. Most companies are deploying next-generation firewalls to block modern threats such as advanced malware and application-layer attacks.

5. Threat-focused NGFW : - These firewalls include all the capabilities of a traditional NGFW and also provide advanced threat detection and remediation.  Details Not Provided.. just tried to summerized it As Much as possible.

Balaji C
by Balaji C , SAP IDM Expert , Dover Corporation

To understand what is firewall please read below :

In networking, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.[1] A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted Firewalls are often categorized as either network firewalls or host-based firewalls

 

It can be used in Cisco or anyother routers 

Hardware and Software Firewalls

Firewalls can be either hardware or software but the ideal firewall configuration will consist of both. In addition to limiting access to your computer and network, a firewall is also useful for allowing remote access to a private network through secure authentication certificates and logins.

Hardware firewalls can be purchased as a stand-alone product but are also typically found in broadband routers, and should be considered an important part of your system and network set-up. Most hardware firewalls will have a minimum of four network ports to connect other computers, but for larger networks, business networking firewall solutions are available.

 

Software firewalls are installed on your computer (like any software) and you can customize it; allowing you some control over its function and protection features. A software firewall will protect your computer from outside attempts to control or gain access your computer.

Common Firewall Filtering Techniques

Firewalls are used to protect both home and corporate networks. A typical firewall program or hardware device filters all information coming through the Internet to your network or computer system. There are several types of firewall techniques that will prevent potentially harmful information from getting through:

Packet Filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.

Application Gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.

Circuit-level Gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.

Proxy Server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

In practice, many firewalls use two or more of these techniques in concert. A firewall is considered a first line of defense in protecting private information. For greater security, data can be encrypted.

Home Front
by Home Front , فني تكنولوجيا المعلومات , multimedia Center Systems

السلام عليكم و رحمة الله وبركاتة

Cisco Provides IOS Firewall Cisco Router use this software it's contant various Firewall technologies

1- Static Packet-Filtering Firewall.. This first generation firewall is a Layer3 device

2- Circuit Level Firewall.. This second generation firewall validates the packet between two peer transport layers

3- Application Layre Firewall.. This third generation firewall can validate security items that appear only within the application layer data such as user passwords and service requests

4- Dynamic Packet Filtering Firewall.. This fourth generation firewall sometimes called stateful firewall these firewall operate at Layers 3,4 and 5

 

نصر الدين نجادي
by نصر الدين نجادي , عون امن , البترول

Uses a firewall ASA 1000V modified safety devices technology (ASA) the most widespread and proven effectiveness, and enhanced virtual infrastructure built high-security and cloud and multiple guests on the edge. This helps enable consistency across physical and virtual environments and cloud

There is a firewall and one.

More Questions Like This