Firewalls 101

Firewalls 101

Ashton Mills straps on some flame-retardant clothing and attempts to venture through a few walls of fire.

A long time ago, mankind made a firewall. Its purpose was simple and clear – block incoming and, optionally, outgoing ports. It could be blanket, or allow traffic to or from specific ports, or even IP addresses. Later, it could even be done based on protocol.

In this humble beginning, it was elegant and simple, but the demands of users, and networks, were not. Especially in large networks, with the demands of different work environments, there would be a plethora of necessary Internet-enabled applications, and opening up the ports for all of them would give you a firewall that resembled Swiss cheese, rather than anything effective. And why open ports that may only be used once or twice, or temporarily?

What was needed was an intelligent firewall that could outright block most ports, and open others only as required, and thus the stateful firewall was born. This particular invention made it so that incoming traffic destined for a machine on the network would be allowed in only if the target machine had first initiated contact. Sort of like a door that only opens when it’s needed, and only from the inside.

The firewall does this by tracking the outgoing connections and comparing incoming connections against them. If the address and port of an incoming connection matches the address and port of an outgoing connection, the data transfer is allowed to go through.

Today, pretty much all firewalls are stateful – from those your ISP uses, to your router, to the software firewall on your PC. They make it possible to have good protection without sacrificing usability.And though they can’t be easily abused, they can in some cases be bypassed.

Tricksy software
You might have had times when, setting up an FTP or game server, you had to tell your router or operating system’s firewall to allow certain programs or services through. That’s because, as it should, your firewall would see any incoming connections as a threat, and drop them.

Some of you may be familiar with the Hamachi software that lets you set up a VPN over the Internet at the touch of a button. It enables you, for example, to play games with your friends without the need to enter their IP address, or connect to them over a game browser. Instead, you select to play over a ‘LAN’, and voila, your mates’ machine is detected as if it were on a LAN in the next room.

Hamachi makes playing networked games easy as pie but more importantly, if you’re hosting a game, you don’t need to open ports in your firewall. It just works.

And Skype, of course, helped the VoIP wave take off and now at any one time there are millions of users using it to call each other over the Internet. But once you’ve installed the software, you don’t need to tell your firewall to let connections of people calling you in, they just work.

So how is it that another Hamachi user can connect to your machine, or a Skype user can call you, without ever telling your firewall to let them through?


Browse this article:   Next

This Feature appeared in the May, 2007 issue of PC & Tech Authority Magazine

See more about:  firewalls  |  firewall  |  security  |  virus  |  hack  |  hacker
 
 
Latest articles on BIT Latest Articles from BIT
Best business endpoint protection software
20 Feb 2017
Want to get serious about protecting your systems and data? Start with one of these business-grad...
Fake ATO emails spreading malware
20 Feb 2017
A "huge run" of fake ATO emails is delivering malware, including ransomware and keyloggers, ...
Qnap TS-451+ review: a four-bay NAS with speed to burn
17 Feb 2017
Looking for a network attached storage device with plenty of capacity, speed and features? The ...
How to secure your Office 365 data
17 Feb 2017
Microsoft has released Office 365 Secure Score and a video explaining how to use it to keep your ...
Top seven internet security suites of 2017
17 Feb 2017
We put the latest internet security software suites to the test, so you can judge for yourself ...

Latest Comments

From our Partners

PC & Tech Authority Downloads