DELL Inspiron Resources

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, July 10, 2008

Gateway v/s Firewall

Posted on 2:22 PM by Unknown
Gateway
A gateway is a network point that acts as an entrance to another network. On the Internet, a node or stopping point can be either a gateway node or a host (end-point) node. Both the computers of Internet users and the computers that serve pages to users are host nodes. The computers that control traffic within your company's network or at your local Internet service provider (ISP) are gateway nodes.

In the network for an enterprise, a computer server acting as a gateway node is often also acting as a proxy server and a firewall server. A gateway is often associated with both a router, which knows where to direct a given packet of data that arrives at the gateway, and a switch, which furnishes the actual path in and out of the gateway for a given packet. IP is a unique 32-bit number that identifies the location of your computer on a network

Firewalls:
A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through.



Firewalls use one or more of three methods to control traffic flowing in and out of the network:

Packet filtering - Packets (small chunks of data) are analyzed against a set of filters. Packets that make it through the filters are sent to the requesting system and all others are discarded.

Proxy service - Information from the Internet is retrieved by the firewall and then sent to the requesting system and vice versa.

Stateful inspection - A newer method that doesn't examine the contents of each packet but instead compares certain key parts of the packet to a database of trusted information. Information traveling from inside the firewall to the outside is monitored for specific defining characteristics, then incoming information is compared to these characteristics. If the comparison yields a reasonable match, the information is allowed through. Otherwise it is discarded

Firewalls are customizable. This means that you can add or remove filters based on several conditions. Some of these are

IP addresses: Each machine on the Internet is assigned a unique address called an IP address
Domain names: A company might block all access to certain domain names, or allow access only to specific domain names.
Protocols: The protocol is the pre-defined way that someone who wants to use a service talks with that service.

- IP (Internet Protocol) - the main delivery system for information over the Internet
- TCP (Transmission Control Protocol) - used to break apart and rebuild information that travels over the Internet
- HTTP (Hyper Text Transfer Protocol) - used for Web pages
- FTP (File Transfer Protocol) - used to download and upload files
- UDP (User Datagram Protocol) - used for information that requires no response, such as streaming audio and video
- ICMP (Internet Control Message Protocol) - used by a router to exchange the information with other routers
- SMTP (Simple Mail Transport Protocol) - used to send text-based information (e-mail)
- SNMP (Simple Network Management Protocol) - used to collect system information from a remote computer
- Telnet - used to perform commands on a remote computer

Proxy Servers and DMZ
A function that is often combined with a firewall is a proxy server. The proxy server is used to access Web pages by the other computers. When another computer requests a Web page, it is retrieved by the proxy server and then sent to the requesting computer. The net effect of this action is that the remote computer hosting the Web page never comes into direct contact with anything on your home network, other than the proxy server. Proxy servers can also make your Internet access work more efficiently. If you access a page on a Web site, it is cached (stored) on the proxy server. This means that the next time you go back to that page, it normally doesn't have to load again from the Web site. Instead it loads instantaneously from the proxy server.

There are times that you may want remote users to have access to items on your network.

Some examples are:
· Web site
· Online business
· FTP download and upload area

In cases like this, you may want to create a DMZ (Demilitarized Zone). Although this sounds pretty serious, it really is just an area that is outside the firewall. Setting up a DMZ is very easy. If you have multiple computers, you can choose to simply place one of the computers between the Internet connection and the firewall. Most of the software firewalls available will allow you to designate a directory on the gateway computer as a DMZ
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DELL SRS Premium Sound
    SRS ( Sound Retrieval System ) Labs was established in 1993 in Santa Ana, California with the purchase of technologies from Hughes Aircraf...
  • BIOS Beep Code
    What is a BIOS Beep Code? When you power on a computer the BIOS immediately takes control of the computer and performs the P.O.S.T (Power On...
  • Fix for Windows XP Fresh Install Stop Error Code 0X0000007B (0XF898F524,0XC0000034,0X00000000,OX00000000) on a Dell E520
    Recently, I have been having some issues with some old machines I had lying around the house. Since I have started into cutting vinyl decals...
  • Dell Inspiron N5010 drivers - review - specs
    Dell Ispiron N5010 also known as Dell Inspiron 15R is one the three newest Inspiron N series with variants Inspiron 14R, Inspiron 15R and th...
  • DELL Inspiron N4010 drivers
    DELL Inspiron N4010 is the latest model of the Inspiron Family. There are three models the Inspiron N4010, Inspiron N5010 and Inspiron...
  • New Link for Cueator 3.0 Pro
    Since this is the second most read post on my blog, I have provided a new link for Cueator Pro. It is now privately hosted. Here's a lin...
  • DELL Inspiron 1464 Drivers
    The Inspiron 1464 is a fully loaded Mid-Range laptop perfect for Graphic artists, IT professionals and students. If so happen that you bough...
  • How to Organize your Music collection
    I have few Gigabyte of music on my Dell Inspiron 14R and most of this music collections are album. If you download or rip your music I have...
  • Dell Inspiron 1440 - no XP drivers
    The Inspiron 1440 was launched during the Vista era and unfortunately there's no D ell Inspiron 1440 XP Drivers. So downgrading to XP is...
  • Gateway v/s Firewall
    Gateway A gateway is a network point that acts as an entrance to another network. On the Internet, a node or stopping point can be either a ...

Categories

  • 0X00000000
  • 0X0000007B (0XF898F524
  • 0XC0000034
  • About Us
  • Buyers Guide
  • Dell e520
  • Free Downloads
  • Inspiron Drivers
  • ipad
  • iphone
  • Manual
  • Microsoft
  • OX00000000)
  • Review
  • Tips and Tricks
  • Tweak
  • Video Driver
  • windows xp

Blog Archive

  • ►  2012 (3)
    • ►  November (1)
    • ►  August (1)
    • ►  June (1)
  • ►  2011 (17)
    • ►  April (10)
    • ►  March (1)
    • ►  February (6)
  • ►  2010 (1)
    • ►  February (1)
  • ►  2009 (3)
    • ►  December (1)
    • ►  July (2)
  • ▼  2008 (10)
    • ►  December (1)
    • ►  October (2)
    • ▼  July (7)
      • CMOS/BIOS
      • Gateway v/s Firewall
      • Vonage
      • BIOS Beep Code
      • XP Tips n Tricks
      • Dell Diagnostics
      • Explorer.exe
  • ►  2007 (1)
    • ►  June (1)
  • ►  2006 (4)
    • ►  September (1)
    • ►  May (1)
    • ►  January (2)
Powered by Blogger.

About Me

Unknown
View my complete profile