Firewall
Firewalls are the first line of defense in protecting networks from the relentless onslaught of cyber threats. Firewalls can create rules to allow or block traffic by using access lists and knowledge of ports and protocols, or by creating screened subnets. This section will consider the inner workings of firewalls to unveil their multifaceted capabilities and the pivotal role they play in fortifying the digital fortresses that shield data and systems from harm.
Firewall Types
Table 18.1 reviews several different types of firewalls, including their missions and the scenarios in which they are best used. These will be broken down into firewall types, rules, access control lists, ports/protocols, and screened subnets:
Host-based firewall |
Mission |
Protects individual devices (such as your computer) |
Use case |
Ideal for safeguarding... |