Firewalls 101

Firewalls 101

Ashton Mills straps on some flame-retardant clothing and attempts to venture through a few walls of fire.

A long time ago, mankind made a firewall. Its purpose was simple and clear – block incoming and, optionally, outgoing ports. It could be blanket, or allow traffic to or from specific ports, or even IP addresses. Later, it could even be done based on protocol.

In this humble beginning, it was elegant and simple, but the demands of users, and networks, were not. Especially in large networks, with the demands of different work environments, there would be a plethora of necessary Internet-enabled applications, and opening up the ports for all of them would give you a firewall that resembled Swiss cheese, rather than anything effective. And why open ports that may only be used once or twice, or temporarily?

What was needed was an intelligent firewall that could outright block most ports, and open others only as required, and thus the stateful firewall was born. This particular invention made it so that incoming traffic destined for a machine on the network would be allowed in only if the target machine had first initiated contact. Sort of like a door that only opens when it’s needed, and only from the inside.

The firewall does this by tracking the outgoing connections and comparing incoming connections against them. If the address and port of an incoming connection matches the address and port of an outgoing connection, the data transfer is allowed to go through.

Today, pretty much all firewalls are stateful – from those your ISP uses, to your router, to the software firewall on your PC. They make it possible to have good protection without sacrificing usability.And though they can’t be easily abused, they can in some cases be bypassed.

Tricksy software
You might have had times when, setting up an FTP or game server, you had to tell your router or operating system’s firewall to allow certain programs or services through. That’s because, as it should, your firewall would see any incoming connections as a threat, and drop them.

Some of you may be familiar with the Hamachi software that lets you set up a VPN over the Internet at the touch of a button. It enables you, for example, to play games with your friends without the need to enter their IP address, or connect to them over a game browser. Instead, you select to play over a ‘LAN’, and voila, your mates’ machine is detected as if it were on a LAN in the next room.

Hamachi makes playing networked games easy as pie but more importantly, if you’re hosting a game, you don’t need to open ports in your firewall. It just works.

And Skype, of course, helped the VoIP wave take off and now at any one time there are millions of users using it to call each other over the Internet. But once you’ve installed the software, you don’t need to tell your firewall to let connections of people calling you in, they just work.

So how is it that another Hamachi user can connect to your machine, or a Skype user can call you, without ever telling your firewall to let them through?


Browse this article:   Next

This Feature appeared in the May, 2007 issue of PC & Tech Authority Magazine

See more about:  firewalls  |  firewall  |  security  |  virus  |  hack  |  hacker
 
 
Latest articles on BIT Latest Articles from BIT
WD's affordable new network storage device reviewed
18 Aug 2016
The WD My Cloud EX2 Ultra offers plenty for the money, including the ability to manage it via ...
How secure is your business data in the cloud?
16 Aug 2016
We examine how cloud providers secure customer data, how to minimise the chances of data leaks, ...
Census fiasco: Three essential lessons for every business
12 Aug 2016
Two experts explain where the ABS went wrong and how your business can avoid making similar ...
Why you should use encryption
12 Aug 2016
The bad guys use encryption because it works. A security expert explains how you can use one of ...
Invoice fraud gets more sophisticated
5 Aug 2016
Security researchers explain how businesses (and their customers) can protect themselves from a ...

Latest Comments

From our Partners

PC & Tech Authority Downloads