BuycPanel Blog

BuycPanel Blog

Latest news and updates

The Firewall: An Important Network Protection Tool

Posted by Allison on 14 08 2017.

As you might have noticed, we have featured a lot of articles regarding server security on our blog site. The reason for this is that we want you to be informed about the different server protection tools and techniques that you can use to prevent unauthorized access and malicious software from entering your system.

Now, for this article, we are featuring the importance of using one of the most common tools used to protect networks from harmful entities: The Firewall.
What are Firewalls?
Firewalls are network security systems that monitor network traffic (incoming and outgoing data). Its system is designed to decide whether to block or allow traffic to and from the network server.

A firewall is the first line of defense for your network. It creates a barrier between secured applications and software within the network and those that are unknown and undefined.
How Does it Work?
A firewall acts as a gateway for transmitting…

As you might have noticed, we have featured a lot of articles regarding server security on our blog site. The reason for this is that we want you to be informed about the different server protection tools and techniques that you can use to prevent unauthorized access and malicious software from entering your system.

Now, for this article, we are featuring the importance of using one of the most common tools used to protect networks from harmful entities: The Firewall.

What are Firewalls?

Firewalls are network security systems that monitor network traffic (incoming and outgoing data). Its system is designed to decide whether to block or allow traffic to and from the network server.

A firewall is the first line of defense for your network. It creates a barrier between secured applications and software within the network and those that are unknown and undefined.

How Does it Work?

A firewall acts as a gateway for transmitting and receiving data. When data is sent from one IP address to another, it travels as a series of data packets. Each data packet is labeled with its source IP address and its destination IP address. If the destination IP address is protected with a Firewall, the packet of data will first be inspected by the firewall to check whether it is allowed to enter the network or not. The firewall will filter the packet of data, checking its source IP, destination IP and the packet itself. It will then decide to either drop or accept the packet of data into its network based on its predefined rules and codes.

To better understand how a firewall works, let’s assume that IP address 209.56.125.94 sent a packet of data to the destination IP 210.57.126.95 and the destination IP is using a firewall system to protect its network.  Once the packet of data sent by the source IP 209.56.125.94 reaches its destination IP, the firewall will inspect the packet of data before allowing it to enter its network.

The firewall will get the source IP address of the packet of data and check its code if the source IP is listed as one of the allowed IP address to enter the network. If it is not, then the packet of data will be dropped and the data transmission will fail. If it listed as one of the IP address that is accepted, it will check the data packet if it doesn’t violate any rules set on the firewall before accepting it. If it violates a rule set on the firewall then the data packet will be dropped.

A firewall works both ways and can also limit the access of internal users.

What are the Different Uses of a Firewall?

  • To Block an Individual IP or Range of IP addresses
  • To Limit Access to a Network
  • To Prevent DoS attacks (Denial of Service attacks)
  • To Limit the Access of Internal Users to Remote Sites Within the Network and Predefined Sites Outside the Network
  • To Filter internet access within the network

A firewall is an important tool needed by network systems to act as the first line of defense against unauthorized access and malicious software. It is necessary to protect our servers from the various threats that exist today. Without it, our systems will be vulnerable from attacks from different entities and would definitely make any important data and information on our server unsafe.