Firewall Service Management Characteristics That Are Often Used

Manage Service Firewall

Firewall Characteristics Often Used by Service Providers Manage Service Firewall

Firewall, this is a firewall service management feature provided by the operating system on the computer. One operating system that provides this feature is the Windows operating system.

The definition of a Firewall Service Management is a security system on the network to protect the device in this case the computer from various attacks from outside by blocking unauthorized data packets. Want to know more details about firewalls? you can check here.

Another use of a firewall is to limit and control access to certain data within a network. This firewall has its own managed service firewall characteristics which we will discuss below.

Characteristics of Firewalls

Characteristics can be divided into two firstly named as Personal Firewall Service Management and also Network Firewall.

Firewalls have also become a special service, namely managed service Firewall.

Below we have presented the important information to get to know the two characteristics of the Firewall managed service Firewall.

Personal Firewall

Personal Firewall is a characteristic of the Manage Firewall service that can be utilized by individuals or individuals who are used to protect their computers from various attacks from outside the network.

Manage service Firewall usually provides a Firewall in the form of an application that can also be a package with the operating system.

Firewalls can also be installed in the form of applications such as antivirus which can be installed independently.

Some of the possible benefits of using a personal firewall are that users can avoid spamming, spyware, or viruses that can enter at any time into the computer without our knowledge.

Network Firewall

Network Firewall

Network Firewall is a network security that is used specifically to secure computer networks which is also implemented by the Manage Service Firewall.

There are several types of Network Firewalls that exist with various types of networks. This type of network firewall includes ISA Server, IPTables, Cisco ASA, Cisco PIX, and so on.

Of all these types of firewalls, they still have one goal, namely to protect computer networks from various crimes in cyberspace that can enter and steal important data at any time.

In addition to the characteristics of a firewall above, there are actually several characteristics of an existing firewall, namely: A

  • a firewall must have the best level of security to prevent attacks from outside. Thus, the operating system will be safer, so there is no need to worry about important information on the computer not being stolen.
  • Firewall will create predetermined activity on the network so that restrictions are made on activities on the computer, this method can be set in a policy or policies that can be set in the configuration.
  • Every activity, whether activity from within or from outside, still has to pass through the Firewall first. So that the Firewall can limit activities that have the potential to harm computer networks.

Firewall Functions The Firewall

functions in securing computer networks that are often used. Manage Service Firewalls are described below:

  • Firewall can be used to control or monitor data packets on the network. So that later the Firewall will monitor and control the data that passes and filter it.
  • The firewall will check data passing on the private network.
  • Used to check every access whether suspicious or not.

Firewall Architecture Firewall

Arsitektur Firewall

architecture as we see above explains that a firewall is located after the internet so that all data entering the network can be restricted directly.

And some Firewall architectures that are often used by the Manage Service Firewall are as:

Dual-homed Host

followsThe first Firewall architecture is dual-homed host, which means that this architecture has at least 2 network interfaces which are also often used by the Manage Service Firewall in Indonesia.

To activate this architecture we must turn off the router on the computer network. So that the computer system can communicate with dual-homed hosts and also systems that are outside the firewall. But these two systems cannot make direct communication.

Screened HostScreened

The Firewall Architecture Host function of this architecture is to provide services originating from the host network to then be given to the internal network by using a separate router.

Using a screened host is to use packet filtering. So that every system that comes from outside or externally that is accessing the internal system must first ask for permission and be connected to the bastion host.

Bastion host is used if the user wants to get a high level of security that is located on the internal network.

Screened Subnet Screened subnet

architecture is the architecture of a firewall which serves to add an additional layer of security on the screened host.

How to use it adds a parameter network to make it easier to isolate on the internal network.

How to Block Programs with a Firewall

If you are a Windows OS user, chances are that you rarely use the Firewall feature or use it by default.

Windows Firewall is a free program that is indeed embedded as a Windows security feature.

When installing Windows OS, Firewall is also included. You can use Windows Firewall to block programs or applications from accessing the internet.

For security affairs Windows OS uses a firewall to protect itself from various attacks from outside or from within the network.

If you have a program or application installed on your computer, of course it will update the application online and automatically.

It could also be that during the automatic renewal it can bring your personal data but it is not known.

So with Firewall you can control how and when programs or applications connect to the internet or other networks.

Here’s how to block software with Windows firewall, especially in Windows 10:

  • Inbound rules

Inbound rules are rules that apply to data traffic originating from outside the network. For example, when downloading data from the internet.

Click Windows keyboard key + R to run the Run dialog box. Then type “firewall.cpl”> OK to open the Windows Firewall window.

In the Windows Firewall window that opens on the left click the Advanced settings button. In the advanced settings window, click Inbound Rules> New Rule.

In the New Inbound Rule Wizard dialog box click the radio button labeled Program> Next. Then still in the New Inbound Rule Wizard window select the Radio button labeled This Program Path> Browse.

Select a program to be blocked, for example Google Chrome> Open> find the executable (.exe) file from Chrome> click Open.

The textbox will contain the address of the Chrome.exe program then click next.

Then select the Radio button labeled Block The Connection and then click Next.

Make sure you check all the boxes labeled Domain, Private, and Public then click Next.

Then give the name Inbound Rule that is being created, for example Chrome Inbound then click Finish.

  • Outbound rules

Outbound rules are rules that apply to data traffic originating from computers to the internet.

For example a page opening request through the browser including outbound rules, when the page has appeared in the browser including inbound rules, the steps for making it are the same as creating inbound rules.

In the Windows Firewall with Advanced Security window, click Outbound Rules> New Rule> give a different name to the Inbound Rule, for example Chrome Outbound> Click Finish.

Those are some discussions about the characteristics of Firewalls used by most Manage Service Firewalls in Indonesia and globally. Interested in NetData’s Firewall Service Management? You can call us here.


Leave a Reply

Your email address will not be published. Required fields are marked *

Semua operasional PT. Network Data Sistem akan menggunakan domain per tanggal 8 Mei 2019. Semua informasi/promosi dalam bentuk apapun selain menggunakan domain bukan tanggung jawab PT. Network Data Sistem Dismiss