A Firewall – means the packet filtering traffic coming from the external network towards the local network or computer. Let’s consider the reasons and tasks performed by the Firewall. Modern data network – a plurality of remote high-performance devices communicating with each other at a distance. One of such data transmission networks is the Internet. It simultaneously operates millions of sources and consumers of information all around the world.
Thus, common access to unified physical resources gives access to scammers, viruses and competitors the ability to harm end users: to steal, corrupt, toss or destroy stored information, disrupt the integrity of the software and even withdraw the hardware of the end station. In order to prevent undesirable effects of data is necessary to prevent unauthorized access, which is often used Firewall.
The principle of the Firewall is based on the control of incoming traffic from outside. A website firewall can be implemented either hardware or software. The most common type of Firewall is software. In this case, it is implemented as a program running on the destination computer or network boundary device, such as a router.
Firewall allows you to configure filters that are responsible for passing traffic by the following criteria:
1. IP address. As you know, any finite device that works on the IP protocol must have a unique address. By specifying an address or a certain range, you can prevent them from receiving packets from them, or vice versa, to allow access only from IP address data.
2. Domain name. As you know, the site on the Internet, more accurately its IP-address can be put in the corresponding alphanumeric name, which is much easier to remember than a set of numbers. Thus, the filter can be configured to pass traffic only to/from one of the resources, or deny access to it.
3. Port. It’s about software ports, i.e. access points of applications to network services. For example, ftp uses port 21, and applications to view web pages port 80. This allows you to deny access from unwanted services and network applications, or vice versa, to allow access only to them.
4. Protocol. A firewall can be configured to skip data from only one protocol, or deny access with its use. Typically, the protocol type can talk about the tasks being performed, the application it uses, and the set of security settings. Thus, access can be configured only for the operation of any one specific application and prevent potentially dangerous access using all other protocols.
In summary, the Firewall provides a comprehensive set of tasks to prevent unauthorized access to your , corruption or theft of data, or other negative impact that may affect the network’s performance. Typically, a firewall is used in conjunction with other security features, such as antivirus software.
Reference: Magento 2 Extensions – Aheadworks