The definition itself is a security system whose job is to protect your computer from various threats on the internet network. This security system works like a wall that limits the network on a computer. With this “firewall” you can limit data traffic, information, and activities on a computer network.
This security system is divided into two types, namely hardware and software. These two security systems have different settings and configurations. However, the function remains the same, namely protecting network security.
Usually, we often find software-based security systems that are widely used as a security system for home internet users. Usually, this security system is added with anti-virus assistance to make it more secure. This type of security system protects both inbound and outbound traffic.
Using a firewall in the world of computer networks is mandatory. Where it is important we know what the function of this security system is and what its duties are along with a full explanation.
As an internal data barrier with wide network access. Because of this security system, hackers and foreign users cannot access the data on your computer. If the computer does not have a security system, the data on that computer is very vulnerable to being hacked and stolen.
Sometimes some people are not responsible for trying to send a computer virus in the form of a message sent to you. Usually, this message is sent via email if you click it then a program is installed accidentally and makes your computer suddenly shut down.
This will not happen if you activate the security system on the computer. So that messages that should be blocked automatically by the security system are free to be sent to your email inbox.
Apart from blocking messages that contain viruses, this system can also block websites or content from certain website addresses. You can set it manually so that access to the website is not allowed.
Playing online games also comes with risks. Where this online gaming network is also vulnerable to hacking irresponsible people.
By utilizing a Firewall, unused ports will be closed by the security system so that hackers cannot use them to send viruses to you.
A firewall Can also be used for bandwidth monitoring and limit the internet speed that will be used.
For example, bandwidth usage is prioritized for business so that the bandwidth used for content such as music, videos will be reduced.
A firewall Can also be used to facilitate VPN or Virtual Private Network connections. By using a VPN service, your internet network access will be safer.
With a VPN you can access blocked sites. So that with the help of this security system will help secure you from unwanted viruses.
This firewall works like a filter, where this filter is useful for filtering data on the network on the internet. You can set the data that is allowed or not be accessed by the computer yourself.
There are three ways the filter works in a security system in securing this network, here is a complete explanation.
firewalls have their own rules to see whether or not data access to the network is allowed. Each data packet is checked independently and is isolated if the packets are sent individually.
If the data packet is considered dangerous, it will not be allowed to enter. Conversely, if it is safe, the data will be forwarded into the system.
This application works as a liaison between computer networks. Proxy applications are located in the security system and are responsible for examining the data packets exchanged in the network.
This system can trace data packets received by the previous activity. The package received is then checked into the packet database. Whether the package is positive or does not represent a risk of harm, it will be forwarded to the requested system.
Choosing a firewall is a bit of a dilemma because we are still confused about choosing a security system that suits our needs. Each security system certainly has its features and configurations. So we have to know what types of computer security systems are on your computer.
Security systems on computers are generally divided into categories based on their general structure and method of operation. Here are 8 types of firewalls that you need to know.
Packet-Filtering Firewall is a security mechanism that blocks network data packets that are carried out based on the rules previously set by the user.
With this security technology, it is the oldest security system that sorts data packets that are allowed to enter and data that is blocked. This computer security system checks the data packets that are on the router or switch traffic.
The data that is checked include packet type, port number, IP address, and surface-level information without opening the data packet. If the packet does not pass the check, it is discarded.
The advantage of Packet-Filtering Firewall is that it does not require too many resources so that it does not overload your computer’s performance. The drawback is that it has a fairly outdated technology compared to today’s computer security systems.
Lever Circuit This Is a fairly simple type of security system that is intended to work easily and quickly approve or reject traffic, without using significant computational resources.
The main function of the Circuit Level Gateway Firewall is to verify the Transmission Control Protocol (TCP). TCP checks are designed to ensure that the session of the packet is valid or secure.
Even though it has few resources, it cannot check incoming and outgoing packets. So if there is malware but it escapes within the TCP handshake then the packet still passes so this security system is not suitable for business.
Stateful Inspection Firewall is a network whose job is to track the characteristics and operating conditions of the network. This Stateful Inspection Firewall is configured to distinguish good and proper network packets across different types of connections.
This security system combines TCP packet inspection and handshake verification technology for a higher level of protection.
But the drawback of this security system requires more computational resources. And it can slow down the transfer of legitimate packets when compared to other security systems.
Proxy Firewall is similar to Application-Level Gateway or Cloud Firewall types. Proxy Firewalls operate at the application layer to sort incoming traffic between networks by network traffic sources. This is why it is called an Application-Level Gateway or application-level bridge.
This security system is delivered via a cloud-based solution or another proxy device. So as not to let traffic connect directly, this proxy security system will first make a connection to the traffic source and check the incoming data packet so that it is properly filtered.
In short, this Firewall proxy creates an extra layer of separation between the client and individual devices on your network. This computer security system provides additional protection for anonymous networks.
Of course, this multi-layered security system can significantly delay the transmission of computer networks.
From the name alone, it is very clear that the Firewall is a new generation. Its features are quite comprehensive ranging from internal packet inspection, TCP handshake inspection, and surface-level packet inspection.
Another computer security system technology is the intrusion prevention system or IPS. IPS is an intrusion prevention system that functions to stop attacks on your network automatically and fix the problem.
often considered an antivirus. The difference is that a computer security system can control network traffic in a system that acts as a filter for incoming traffic. Meanwhile, antivirus protects the system from internal attacks by looking for malicious files and then deleting them.
This one software includes all types of computer security systems installed on the device. The benefits of this type can create deep protection by isolating the network from both directions.
The downside of this computer security system is that maintaining software on different devices can be difficult and time-consuming.
Is a type of computer security system that has a physical form in the form of a device that works like a router. The way it works is to intercept data packets and traffic requests before they are connected to the network.
The last one is a cloud Firewall or Firewall-as-a-Service (FaaS). This computer security system is considered to be similar to a proxy. Because cloud servers are used in proxy settings. However, proxies are not always in the cloud.
Operates by using rules. Each rule consists of a two-part matcher which corresponds to the traffic flow against the given conditions and measures whether the existing packet is suitable or not.
Filtering rules are grouped in a chain. So that packets are matched under one common criterion in one chain, and then passed for processing against some other common criterion for the other chain.
The sample data packet must match the IP address and port, of course, this can be done by adding some rules with the IP address and port according to the chain forward.
But the best way is to add one rule that matches traffic from a specific IP address, for example, filter / IP add src-address = 126.96.36.199/32 jump-target = “chain”.
NAT or Network Address Translation is a computer security system feature that functions to change the IP address to the sender who will be sent to the internet.
Technically, this NAT changes the data packets originating from the user’s computer as if they came from a router.
Firewall NAT consists of several commands such as src-nat and masquerades which can hide the local IP and replace it with the public IP already installed on the router.
This command is used to change the destination IP address or direct the connection to localhost.
In configuring or setting the Firewall on Mikrotik can be done in several easy-to-understand steps.
For example in Mikrotik with interfaces called LAN and WAN. The WAN IP address is 192.168.42.75 and the LAN IP address is 192.168.1.1.
To start the configuration, we can select menu: IP> Firewall, then we can add settings as needed.
Blocking a site using a computer security system on Mikrotik is quite easy, you can follow the steps below.
The explanation of the configuration above is that if there is a computer from the LAN network that wants to access the website www.google.com with IP 188.8.131.52 with Outgoing via the WAN interface, the connection will be dropped or blocked by Mikrotik.
A filter rule is a rule or policy used to allow traffic to existing in the network, identical to Accept or drop. On the Firewall> Filter Rules menu, there are 3 types of chains available, along with an explanation.
In chain processing, rules that are taken from the chain according to a list of orders will be executed from top to bottom. If the packet matches a rule, certain actions will be performed on it and no more rules will be processed in the chain. If the packages do not match, they will be accepted.
a firewall does have benefits for protecting the network on your computer. But not always this computer security system has positive things, it turns out that there are also negative sides, for example causing conflicts with the default computer security system from other hardware.
Therefore you can turn off the default computer security system from an operating system such as Windows OS.
How to turn it off in Windows 7 is quite easy, following the steps.
To turn it off Windows 8 is not too different from the Windows 7 computer security system.
in Windows 10 turning off the computer security system is also easier as below.