{"id":1426,"date":"2023-10-30T00:10:36","date_gmt":"2023-10-30T00:10:36","guid":{"rendered":"https:\/\/matob.web.id\/random\/?p=1426"},"modified":"2023-10-30T00:10:36","modified_gmt":"2023-10-30T00:10:36","slug":"what-is-firewall","status":"publish","type":"post","link":"https:\/\/matob.web.id\/random\/what-is-firewall\/","title":{"rendered":"What is Firewall?"},"content":{"rendered":"<p>Firewall. Maybe you remember it only as one of the settings options on your computer.\u00a0Complete with a globe icon covered with a red brick wall.\u00a0Behind this memorable icon, it turns out that a firewall is one of the most important parts of your computer&#8217;s security.<\/p>\n<p>In this article you will learn more about firewalls.\u00a0We will discuss what exactly a firewall is, the types of firewalls, what they are used for, and how they work.\u00a0That way you will no longer take it for granted in the settings on your computer.<\/p>\n<h2>What are Firewall?<\/h2>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-1429 aligncenter\" src=\"https:\/\/matob.web.id\/random\/wp-content\/uploads\/sites\/2\/2021\/11\/Firewall.jpg\" alt=\"Firewall\" width=\"626\" height=\"417\" title=\"\"><\/p>\n<p>A <a href=\"https:\/\/matob.web.id\/random\/1001\/what-is-firewall\">firewall<\/a> is a security system that protects your computer from various threats on the internet network.<\/p>\n<p>In other words, a firewall works as a partition or wall that limits computers from the internet network.\u00a0Through this &#8220;firewall&#8221; you can manage what data, information, and activities are allowed to pass from the internet network to your computer and vice versa.<\/p>\n<p>But did you know?\u00a0Actually, not all firewalls are the same, you know.\u00a0There are different types of Firewalls that you should know about.\u00a0Let&#8217;s see in the next section!<\/p>\n<h2>What are the Types of Firewall?<\/h2>\n<p>There are two types of firewalls, namely\u00a0<strong>hardware\u00a0<\/strong>and\u00a0<strong>software\u00a0<\/strong>.\u00a0Both have different configurations or settings.\u00a0Even so, they still have the same main function: protecting network security.<\/p>\n<ul>\n<li><a href=\"https:\/\/matob.web.id\/random\/1001\/what-is-firewall\"><strong>Hardware based firewalls <\/strong><\/a>are hardwaredevices contained in network systems, such as routers.\u00a0This kind of firewall requires configuration to work effectively.\u00a0To be able to work, the firewall uses filtering techniques to determine the\u00a0main\u00a0<em>packet\u00a0<\/em>, source, and destination.\u00a0Internally the system will compare the data according to the set rules.\u00a0Then, it decides which data needs to be\u00a0<em>dropped\u00a0<\/em>or passed to the destination.<\/li>\n<li><a href=\"https:\/\/matob.web.id\/random\/1001\/what-is-firewall\"><strong>Software based firewall <\/strong><\/a>is a solution for network protection for internet users at home.\u00a0Usually this firewall is created in the form of a separate application or as an additional feature of anti-virus.\u00a0This type of firewall protects both inbound and outbound traffic, while also protecting you from Trojan viruses and Worms.<\/li>\n<\/ul>\n<h2>What is the Function of a Firewall?<\/h2>\n<p>Security reasons are of course the main reason for using a firewall.\u00a0You could even say that the use of a firewall is mandatory or non-negotiable.\u00a0However, to better understand the importance of using a firewall, we will discuss one by one what a firewall can do.<\/p>\n<h3>1. Protect Data from Hackers and Unauthorized Users<\/h3>\n<p>As mentioned above, a firewall functions like a partition between internal data and external access.\u00a0Because of the firewall, hackers and foreign users cannot access your data.\u00a0In other words, data will be prone to being stolen when the computer is not installed with a firewall.<\/p>\n<h3>2. Block Unwanted Messages<\/h3>\n<p>You get a mysterious message saying your computer is in danger.\u00a0If you do not immediately install certain programs, the computer will turn off in seconds.\u00a0Does such a message feel familiar?<\/p>\n<p>If you ever get that message, chances are that the firewall on your computer is not installed properly.\u00a0Spam messages like the one above are found on computers with the XP operating system.<\/p>\n<h3>3. Block Unwanted Content<\/h3>\n<p>In addition to blocking spam messages and containing viruses, firewalls can also be used to block websites or content from specific addresses.\u00a0You can manually set what kind of content is not allowed to be accessed through a computer.<\/p>\n<h3>4. Making Online Games More Safe and Comfortable<\/h3>\n<p>Online games have risks and security holes.\u00a0This is due to the rapid exchange of data that occurs between networks.\u00a0So it could be\u00a0<em>hackers\u00a0<\/em>insert malware into your computer.\u00a0Although generally online game servers are equipped with advanced security features, it&#8217;s a good idea to be on guard with a firewall that is set-up to your own computer.<\/p>\n<h3>5. Monitor Bandwidth<\/h3>\n<p>Firewalls are not only useful for ensuring computer network security is maintained.\u00a0In addition to the main firewall functions, it can also be used to monitor and limit the bandwidth used.\u00a0For example, you can set limits for entertainment content, pictures, and music.\u00a0Then prioritize bandwidth for more business-critical content.<\/p>\n<h3>6. Access VPN Service<\/h3>\n<p>Firewalls can also be used to facilitate Virtual Private Network or VPN connections.\u00a0Through this service, users can access your internal network.\u00a0With the same service, you can access content or websites that were previously blocked by certain parties.\u00a0This of course can increase productivity, collaboration, and\u00a0data sharing<em>.<\/em><\/p>\n<p>After knowing the many things a firewall can do, it&#8217;s certainly more complete if you know how it works.\u00a0In the next section we will discuss in detail the logic behind what firewalls do.<\/p>\n<h2>How Does a Firewall Work?<\/h2>\n<p>Firewalls work by filtering data (packets) between networks on the internet.\u00a0It can allow or not allow a packet to be accessed by a computer.<\/p>\n<p>There are three ways that firewalls use to secure a network.\u00a0Firewalls can use one, two, or a combination of the following three methods to secure the network.\u00a0See the following explanation for more details:<\/p>\n<h3>1.Packet filtering (Stateless)<\/h3>\n<p>Firewalls use certain rules to see if data is allowed to enter the network.\u00a0Each packet is checked individually or in isolation.\u00a0If packets are sent in groups, each packet will be checked individually.<\/p>\n<p>When a packet is considered dangerous then it will not be allowed to enter.\u00a0On the other hand, when the packet is considered secure, it will be forwarded to the requesting system.<\/p>\n<h3>2. Proxy Service<\/h3>\n<p>This is an application that works as a link between network systems. Proxy <a href=\"https:\/\/matob.web.id\/random\/software\/best-android-iphone-video-editing-applications-no-watermark\/\">applications<\/a> are inside the firewalls and are tasked with checking for packets exchanged on the network.<\/p>\n<p>This system can be said to be more effective. This is because all information is checked in a centralized manner. This way of working can be said to be more sophisticated because the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Proxy_server\" target=\"_blank\" rel=\"noopener\">proxy<\/a> service tries to create a similar relationship between networks. The proxy seems to be connecting the network directly, even though it&#8217;s just trying to copy a similar mechanism.<\/p>\n<h3>3. Stateful Inspection<\/h3>\n<p>This system traces received packets with previous activities.\u00a0Received packets are then checked in the packet database.\u00a0If the packet has a positive connotation or does not indicate a risk of harm, then it will be forwarded to the requesting system.<\/p>\n<p>When the firewall finishes examining the packet, it will then respond in one of three ways.\u00a0<em>First\u00a0<\/em>,\u00a0<strong>accept\u00a0<\/strong>or accept.\u00a0That is, the firewall will allow traffic to pass through the network.\u00a0<em>Second\u00a0<\/em>,\u00a0<strong>reject\u00a0<\/strong>or reject.\u00a0This means that the firewall refuses traffic to pass through and responds with an \u201cunreachable error\u201d display.\u00a0<em>Finally\u00a0<\/em>,\u00a0<strong><em>drop\u00a0<\/em><\/strong>or skip where the firewall rejects traffic without sending a message.<\/p>\n<h2>Let&#8217;s Use Firewall Now!<\/h2>\n<p>Firewall is something that should not be missed before accessing the internet.\u00a0This element ensures that you can surf the internet without worrying about being exposed to viruses or experiencing data theft.<\/p>\n<p>Through this article, you now know what a firewall does and how it works.\u00a0But, of course, that&#8217;s not enough.\u00a0Now, you also need to know how to configure the <a href=\"https:\/\/matob.web.id\/random\/1001\/web-application-firewall\/\">firewall<\/a> to the network.<\/p>\n<p>Hopefully this article has helped you better understand the ins and outs of internet security.\u00a0Feel free to leave a comment below if you have any questions.\u00a0See you in another article.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Firewall. Maybe you remember it only as one of the settings options on your computer.\u00a0Complete with a globe icon covered with a red brick wall.\u00a0Behind this memorable icon, it turns out that a firewall is one of the most important parts of your computer&#8217;s security. In this article you will learn more about firewalls.\u00a0We will [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1428,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[160,161],"class_list":["post-1426","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-2","tag-firewall","tag-protection"],"_links":{"self":[{"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/posts\/1426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/comments?post=1426"}],"version-history":[{"count":1,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/posts\/1426\/revisions"}],"predecessor-version":[{"id":2680,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/posts\/1426\/revisions\/2680"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/media\/1428"}],"wp:attachment":[{"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/media?parent=1426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/categories?post=1426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/matob.web.id\/random\/wp-json\/wp\/v2\/tags?post=1426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}