Firewalls 101

Firewalls 101

Ashton Mills straps on some flame-retardant clothing and attempts to venture through a few walls of fire.

A long time ago, mankind made a firewall. Its purpose was simple and clear – block incoming and, optionally, outgoing ports. It could be blanket, or allow traffic to or from specific ports, or even IP addresses. Later, it could even be done based on protocol.

In this humble beginning, it was elegant and simple, but the demands of users, and networks, were not. Especially in large networks, with the demands of different work environments, there would be a plethora of necessary Internet-enabled applications, and opening up the ports for all of them would give you a firewall that resembled Swiss cheese, rather than anything effective. And why open ports that may only be used once or twice, or temporarily?

What was needed was an intelligent firewall that could outright block most ports, and open others only as required, and thus the stateful firewall was born. This particular invention made it so that incoming traffic destined for a machine on the network would be allowed in only if the target machine had first initiated contact. Sort of like a door that only opens when it’s needed, and only from the inside.

The firewall does this by tracking the outgoing connections and comparing incoming connections against them. If the address and port of an incoming connection matches the address and port of an outgoing connection, the data transfer is allowed to go through.

Today, pretty much all firewalls are stateful – from those your ISP uses, to your router, to the software firewall on your PC. They make it possible to have good protection without sacrificing usability.And though they can’t be easily abused, they can in some cases be bypassed.

Tricksy software
You might have had times when, setting up an FTP or game server, you had to tell your router or operating system’s firewall to allow certain programs or services through. That’s because, as it should, your firewall would see any incoming connections as a threat, and drop them.

Some of you may be familiar with the Hamachi software that lets you set up a VPN over the Internet at the touch of a button. It enables you, for example, to play games with your friends without the need to enter their IP address, or connect to them over a game browser. Instead, you select to play over a ‘LAN’, and voila, your mates’ machine is detected as if it were on a LAN in the next room.

Hamachi makes playing networked games easy as pie but more importantly, if you’re hosting a game, you don’t need to open ports in your firewall. It just works.

And Skype, of course, helped the VoIP wave take off and now at any one time there are millions of users using it to call each other over the Internet. But once you’ve installed the software, you don’t need to tell your firewall to let connections of people calling you in, they just work.

So how is it that another Hamachi user can connect to your machine, or a Skype user can call you, without ever telling your firewall to let them through?


Browse this article:   Next

This Feature appeared in the May, 2007 issue of PC & Tech Authority Magazine

See more about:  firewalls  |  firewall  |  security  |  virus  |  hack  |  hacker
 
 
Latest articles on BIT Latest Articles from BIT
Synology's DS411 Slim reviewed: a baby NAS for unique needs
14 Nov 2014
The Synology DS411 Slim is one of those products that will be the perfect solution for some, but ...
Why I'm looking at tape again for storage
17 Oct 2014
Jon Honeyball discovers that tape is still the medium of choice for mass storage needs.
My Passport Wireless: share files between everyone regardless of their device
17 Oct 2014
Need an external hard drive? This Western Digital My Passport Wireless can share files across ...
Product Brief: Seagate Business Storage 4-bay NAS
24 Sep 2014
Not everyone needs a high-end, business-grade NAS at home. But for those that do, this Seagate ...
It's time to start planning your Windows Server 2003 replacement
24 Sep 2014
Have an IT advisor? Start working with them on a plan for this, if you haven't already.

Latest Comments

Latest Competitions

Win! A Silicon Power Gift Pack! 

Win! A Silicon Power Gift Pack!

Complete with 8GB flash drive and 1TB portable hard drive!
 

Latest Poll

What PC component are you planning to upgrade in the next six months










Ads by Google

From our Partners

PC & Tech Authority Downloads