{"id":1287,"date":"2021-11-20T09:48:50","date_gmt":"2021-11-20T09:48:50","guid":{"rendered":"https:\/\/matob.web.id\/news\/?p=1287"},"modified":"2021-12-08T02:11:45","modified_gmt":"2021-12-08T02:11:45","slug":"what-is-firewall","status":"publish","type":"post","link":"https:\/\/matob.web.id\/news\/what-is-firewall\/","title":{"rendered":"What is Firewall? Definition, Functions, Benefits, Types, and How it Works"},"content":{"rendered":"<p><em>Firewall<\/em>\u00a0\u00a0is generally known as a system that regulates communication between 2 different networks.\u00a0With the development of the times, many companies use private internet networks to protect digital data assets from unwanted attacks.\u00a0This time, <a href=\"https:\/\/matob.web.id\/news\/\">Matob<\/a> will review the <strong>definition of a firewall, its functions, benefits, types, and how it works.\u00a0<\/strong>Read on until it&#8217;s finished..<\/p>\n<h2><strong>What is Firewall?<\/strong><\/h2>\n<p><strong><a href=\"https:\/\/matob.web.id\/news\/what-is-firewall\/\">Firewall is<\/a> <\/strong>a combination of hardware and software whose function is to separate computer networks into two or more to maintain data security.<\/p>\n<p>Today companies have access to the internet.\u00a0Of course the network at the company has a legal entity in it.\u00a0Therefore, the company&#8217;s digital devices need to be protected from hacker attacks and other bad things.<\/p>\n<p>By definition, a\u00a0<i>firewall<\/i>\u00a0is a computer network security system capable of protecting against\u00a0<i>viruses, malware, spam,<\/i>\u00a0and other types of attacks.\u00a0It can also be said that, a\u00a0<i>firewall<\/i>\u00a0is software to prevent access that is considered illegal or unauthorized from a private network (\u00a0<i>private network<\/i>\u00a0).<\/p>\n<p>Thus, the main task of the\u00a0<i>firewall<\/i>\u00a0itself is to monitor and control all incoming or outgoing access to network connections based on predetermined security rules.<\/p>\n<p>However, there are still some people or\u00a0<i>users<\/i>\u00a0who are not\u00a0<i>aware<\/i>\u00a0of this system and tend to ignore the security system on the computer network.\u00a0In addition, the\u00a0<i>firewall<\/i>\u00a0also has an important role in maintaining the security of traffic on the internet network that is connected to your computer device.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1293\" src=\"https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2021\/11\/Firewall-function.jpg\" alt=\"Firewall function\" width=\"924\" height=\"505\" title=\"\" srcset=\"https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2021\/11\/Firewall-function.jpg 924w, https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2021\/11\/Firewall-function-300x164.jpg 300w, https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2021\/11\/Firewall-function-768x420.jpg 768w\" sizes=\"auto, (max-width: 924px) 100vw, 924px\" \/><\/p>\n<h2><strong>Firewall function<\/strong><\/h2>\n<p>The functions of a firewall in a network are:<\/p>\n<h3 style=\"padding-left: 40px;\"><strong>1. Controlling and Monitoring Data Packet Flow<\/strong><\/h3>\n<p style=\"padding-left: 40px;\">The firewall function on the first computer <a href=\"https:\/\/matob.web.id\/news\/what-is-a-lan-network-definition-topology-advantages-and-disadvantages\/\">network<\/a> is useful in controlling and monitoring the flow of data packets flowing on the network.\u00a0The firewall function also includes modification of incoming data packets and is able to hide an IP address.<\/p>\n<h3 style=\"padding-left: 40px;\"><strong>2. Become a Network Security Post<\/strong><\/h3>\n<p style=\"padding-left: 40px;\">Furthermore, the firewall function on a computer network is able to control data traffic when accessing a protected private network.\u00a0All traffic either coming out or entering the network must pass through the firewall in order to be checked, either by filtering, limiting or even rejecting.\u00a0The firewall itself will work according to criteria such as the IP address of the source computer, the source TCP\/UDP port, the<a href=\"https:\/\/matob.web.id\/news\/basic-iptables-commands-on-linux\/\"> IP address<\/a> of the destination computer, the destination TCP\/UDP port, and information coming from the header.<\/p>\n<h3 style=\"padding-left: 40px;\"><strong>3. Log User Activity<\/strong><\/h3>\n<p style=\"padding-left: 40px;\">When a computer user accesses data, the firewall will record it as documentation (log files).\u00a0The existence of these data records will be used to develop a computer security system.\u00a0Then, the function of the firewall is to authenticate access to the network.<\/p>\n<h3 style=\"padding-left: 40px;\"><strong>4. Prevent Information Leakage<\/strong><\/h3>\n<p style=\"padding-left: 40px;\">The function of a firewall on a computer network is not just to record user activity.\u00a0Firewalls are also able to prevent the leakage of valuable information.\u00a0Simply put, a firewall that will prevent users from sending valuable files that are confidential or secret to other parties without realizing it.<\/p>\n<hr \/>\n<h2><strong>Benefits of Using Firewall<\/strong><\/h2>\n<p><i>A <a href=\"https:\/\/matob.web.id\/news\/what-is-firewall\/\">firewall<\/a><\/i> which is a barrier that is meant to protect your PC, tablet or phone from the dangers of data-based malware on the Internet has several benefits. The benefits of firewalls are:<\/p>\n<h3 style=\"padding-left: 40px;\"><b>1. Protecting Computers from Illegal Remote Access<\/b><\/h3>\n<p style=\"padding-left: 40px;\">The first benefit, can protect and prevent illegal remote access practices that can be done by a\u00a0<i>hacker.\u00a0<\/i>For example, the cursor of your mouse can suddenly move by itself.\u00a0Of course this can happen with the aim of hacking your personal information or data.<\/p>\n<p style=\"padding-left: 40px;\">With the protection from the\u00a0<i>firewall,<\/i>\u00a0this can be anticipated by applying the correct OS configuration.\u00a0Also, it can disable remote\u00a0<i>desktop<\/i>\u00a0access control\u00a0carried out by hackers on your computer device.<b><\/b><\/p>\n<p style=\"padding-left: 40px;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1294\" src=\"https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2021\/11\/Benefits-of-Using-Firewall.png\" alt=\"Benefits of Using Firewall\" width=\"500\" height=\"311\" title=\"\" srcset=\"https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2021\/11\/Benefits-of-Using-Firewall.png 500w, https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2021\/11\/Benefits-of-Using-Firewall-300x187.png 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<h3 style=\"padding-left: 40px;\"><b>2. Becoming a Safer Online Game Application<\/b><\/h3>\n<p style=\"padding-left: 40px;\">Next, for those of you who like to play\u00a0<i>online gaming<\/i>\u00a0, of course, it will be very worrying if while playing a\u00a0<i>malware<\/i>\u00a0or a message\u00a0appears\u00a0on the computer\u00a0there is a\u00a0<i>virus<\/i> . If you interseted in android gaming, maybe you need to read this article \u00a0<a href=\"https:\/\/matob.web.id\/random\/technology\/fast-android-emulators-for-pc-laptop\/\">android emulator for pc<\/a>.<\/p>\n<p style=\"padding-left: 40px;\">Therefore, with a\u00a0<i>firewall,<\/i>\u00a0it can prevent this from happening and can be blocked quickly and accurately.<b><\/b><\/p>\n<h3 style=\"padding-left: 40px;\"><b>3. Can Block Linked Messages<\/b><\/h3>\n<p style=\"padding-left: 40px;\">On the internet also can occur various possibilities that are not desired by the\u00a0<i>user<\/i>\u00a0.\u00a0Of course, the internet also has the opportunity to appear\u00a0<i>malware<\/i>\u00a0that passes through the virtual world.\u00a0With a\u00a0<i>firewall<\/i>\u00a0, it can prevent this from spreading and having a bad impact on the health of your device.<\/p>\n<hr \/>\n<h2><strong>Types of Firewalls<\/strong><\/h2>\n<p>Firewall types:<\/p>\n<ul>\n<li><strong>Personal Firewall<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 40px;\">Personal Firewall is created to protect computers connected to the network from unauthorized access.\u00a0Currently, this type of firewall is revolutionizing into a collection of programs whose function is to completely secure computers.<\/p>\n<p style=\"padding-left: 40px;\">You do this by adding several security features such as protection against\u00a0virus\u00a0attacks\u00a0, antispyware, antispam, and detecting network security disturbances.<\/p>\n<ul>\n<li><strong>Network Firewall<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 40px;\">Overall network protection from all attacks is carried out by the Network Firewall.\u00a0Network Firewall has several main features, namely Packet filter firewall and stateful firewall, Circuit Level Gateway, Application Level Gateway, and NAT Firewall.\u00a0Network Firewalls are generally transparent to the user and use routing technology to determine which packets are allowed and which packets are rejected.<\/p>\n<h2><strong>How Firewall Works<\/strong><\/h2>\n<p>When your computer has\u00a0<i>firewall<\/i>\u00a0protection\u00a0, everything entering and leaving the computer will be monitored.\u00a0<i>The firewall<\/i>\u00a0monitors all information traffic to allow &#8216;good data&#8217; to enter, and blocks &#8216;bad data&#8217; from entering the <a href=\"https:\/\/matob.web.id\/news\/understanding-cluster-computers\/\">computer<\/a>.\u00a0<i>Firewalls<\/i>\u00a0use one or more of the three methods\u00a0below to control traffic flowing into and out of the network:<\/p>\n<ul>\n<li>\n<h3><b>Packet filtering<\/b><\/h3>\n<\/li>\n<\/ul>\n<p style=\"padding-left: 40px;\">Packets (small pieces of data) are analyzed against a set of\u00a0<i>filters<\/i>\u00a0.\u00a0Packets that pass through the\u00a0<i>filter are<\/i>\u00a0sent to the requested system, while other packets are discarded.<\/p>\n<ul>\n<li>\n<h3><b>Proxy service<\/b><\/h3>\n<\/li>\n<\/ul>\n<p style=\"padding-left: 40px;\">Through\u00a0proxies\u00a0, information from the Internet is retrieved by the\u00a0<i>firewall<\/i>\u00a0and then sent to the requested system and vice versa.<\/p>\n<ul>\n<li>\n<h3><b>State inspection<\/b><\/h3>\n<\/li>\n<\/ul>\n<p style=\"padding-left: 40px;\">A newer method that does not check the contents of each package but compares certain key parts of the package with\u00a0<i>a<\/i>\u00a0trusted\u00a0<i><a href=\"https:\/\/matob.web.id\/news\/programming-languages-beginners\/\">database<\/a> of<\/i>\u00a0information.\u00a0Information from inside the\u00a0<i>firewall<\/i>\u00a0to the outside is monitored to determine specific characteristics, then the incoming information is compared with these characteristics.\u00a0If the comparison results in a reasonable match, the information is allowed in.\u00a0Otherwise, discarded.<\/p>\n<hr \/>\n<p>That&#8217;s information about the meaning of\u00a0<i>firewalls<\/i>\u00a0and their benefits and how they work.\u00a0You should also use a\u00a0<i>firewall<\/i>\u00a0to make the network more secure.\u00a0Hope it is useful!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Firewall\u00a0\u00a0is generally known as a system that regulates communication between 2 different networks.\u00a0With the development of the times, many companies use private internet networks to protect digital data assets from unwanted attacks.\u00a0This time, Matob will review the definition of a firewall, its functions, benefits, types, and how it works.\u00a0Read on until it&#8217;s finished.. What is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1292,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[54,254,141],"class_list":["post-1287","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software","tag-cybersecurity","tag-firewall","tag-network"],"_links":{"self":[{"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/posts\/1287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/comments?post=1287"}],"version-history":[{"count":0,"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/posts\/1287\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/media\/1292"}],"wp:attachment":[{"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/media?parent=1287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/categories?post=1287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/tags?post=1287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}