Misplaced Pages

Talk:Firewall (computing): Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editContent deleted Content addedVisualWikitext
Revision as of 04:00, 5 February 2022 editKvng (talk | contribs)Extended confirmed users, New page reviewers107,800 edits rm redundant and off target← Previous edit Latest revision as of 18:59, 18 September 2024 edit undoLowercase sigmabot III (talk | contribs)Bots, Template editors2,292,502 editsm Archiving 1 discussion(s) to Talk:Firewall (computing)/Archive 1) (bot 
(5 intermediate revisions by 4 users not shown)
Line 1: Line 1:
{{Talk header}} {{Talk header}}
{{WikiProject banner shell|class=C|vital=yes|1=
{{Vital article|topic=Technology|level=5|class=C}}
{{WikiProject Computing |importance=high |network=yes |network-importance=High |security=Yes |security-importance=Top}}
{{WikiProjectBannerShell|1=
{{WikiProject Internet }}
{{WikiProject Computing |class=C |importance=high |network=yes |network-importance=High |security=Yes |security-importance=Top}}
{{WikiProject Internet |class=C}}
}} }}


Line 11: Line 10:
| counter=1 | counter=1
| maxarchivesize=75K | maxarchivesize=75K
| archiveheader={{Automatic archive navigator}} | archiveheader={{Automatic archive navigators}}
| minthreadsleft=5 | minthreadsleft=5
| minthreadstoarchive=1 | minthreadstoarchive=1
}} }}
{{archivebox|auto=yes}} {{archivebox|auto=yes}}

== rb ==
Can someone find a link to a rendered animation about the workings of a firewall. From memory it's about 100Mb in size and shows the journey of packets into and through a firewall . Very educational. Sure is! Great work 'Warriors of the Net' ! thank you.
I just can't remember where I saw it and I've searched with clusty and google images. Much appreciated for finding the link if someone could.
Fret no more; go get it from here:
<small><span class="autosigned">—Preceding ] comment added by ] (] • ]) 03:46, August 20, 2006</span></small><!-- Template:Unsigned -->

:Retro entertainment! Here's an archived version: . Main firewall discussion is at 8:50. ~] (]) 21:52, 21 January 2022 (UTC)


== Morris Worm == == Morris Worm ==
Line 67: Line 58:
:Now covered in ] ~] (]) 21:52, 21 January 2022 (UTC) :Now covered in ] ~] (]) 21:52, 21 January 2022 (UTC)


== Expand logs ==
== Where is the firewall located? ==

The logs section includes a number of useful categories of firewall behavior. It would be worth expanding these beyond just logs into fuller descriptions e.g., ]. ] (]) 04:03, 18 September 2024 (UTC)


:See also {{section link|Internet filter#Types of filtering}}. ] (]) 04:06, 18 September 2024 (UTC)
To say that a firewall can be located anywhere is not particularly useful. Listing the pros and cons of placing it in certain locations would be more useful eg placing it on the public side of a load balancer versus placing it on the private side? ] (]) 15:38, 20 November 2021 (UTC)

Latest revision as of 18:59, 18 September 2024

This is the talk page for discussing improvements to the Firewall (computing) article.
This is not a forum for general discussion of the article's subject.
Article policies
Find sources: Google (books · news · scholar · free images · WP refs· FENS · JSTOR · TWL
Archives: 1Auto-archiving period: 12 months 
This  level-5 vital article is rated C-class on Misplaced Pages's content assessment scale.
It is of interest to the following WikiProjects:
WikiProject iconComputing: Networking / Security High‑importance
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Misplaced Pages. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing
HighThis article has been rated as High-importance on the project's importance scale.
Taskforce icon
This article is supported by Networking task force (assessed as High-importance).
Taskforce icon
This article is supported by WikiProject Computer Security (assessed as Top-importance).
Things you can help WikiProject Computer Security with:
Article alerts will be generated shortly by AAlertBot. Please allow some days for processing. More information...
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.
WikiProject iconInternet
WikiProject iconThis article is within the scope of WikiProject Internet, a collaborative effort to improve the coverage of the Internet on Misplaced Pages. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.InternetWikipedia:WikiProject InternetTemplate:WikiProject InternetInternet
???This article has not yet received a rating on the project's importance scale.


Archives

1



This page has archives. Sections older than 365 days may be automatically archived by Lowercase sigmabot III when more than 5 sections are present.

Morris Worm

No longer in article 21:52, 21 January 2022 (UTC)

The following discussion is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.


This statement describes this virus/worm as still being a current problem today -- is this accurate?

"This virus known as the Morris Worm was carried by e-mail and is now a common nuisance for even the most innocuous domestic user." —Preceding unsigned comment added by 75.7.44.13 (talkcontribs) 16:31, September 23, 2006

The discussion above is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.

Consumer Product Definitions of Firewall Types

I'm a consumer looking at the firewall descriptions of various DSL modems and routers, trying to compare different products and figure out what firewall features are available that I should look for. This Misplaced Pages article hasn't really clarified the situation for me.

One product says "Advanced security from hacker attacks with Stateful Packet Inspection (SPI) and Network Address Translation (NAT) firewalls".

Are those vague general terms, or exact specifications of firewall techniques that will be the same for any product that claims to do them? Statefully inspecting the packets for what -- the same things in any product that implements this? Is NAT really an active firewall, or just that the nature of a shared IP at the router device has this benefit?

One says "Protects PCs from Ping of Death, SYN Flood, Land Attack, IP Spoofing, and other DoS (Denial of Service) Attacks", another says protects against DoS attacks. Is product A better?

Etc. —Preceding unsigned comment added by 75.6.235.68 (talkcontribs) 22:46, September 24, 2006

First to Second Generation Timegap?

No longer in article 21:52, 21 January 2022 (UTC)

The following discussion is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.


"The first paper published on firewall technology was in 1988, when..." "From 1980-1990 three colleagues from..." The two beginnings of the paragraphs concerning first and second generation firewalls. So the second generation firewalls was already eight years in development when the first virus attack occured and the first paper on the topic was published?! Anyone got references for this?

The discussion above is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.

Third generation: application layer -- Inaccuracies

This section would be better titled: Third Generation: NGFW. This is the standard name in the industry today.

Additionally, there's a statement that I believe to be irrelevant to the article.

...Web Application Firewall (WAF). WAF attacks may be implemented in the tool “WAF Fingerprinting utilizing timing side channels” (WAFFle).

The citation (13) references WAFs. WAFs are _not_ the same as network security gateways AKA firewalls. They are a very specific security gateway that protects webservers and focuses on HTTP/HTTPS protections.

This is entirely different from a "regular" firewall. Thus, this portion should be removed. There should really be a separate article dedicated to WAF technology. It is that important and relevant in the industry today.

Now covered in Web application firewall ~Kvng (talk) 21:52, 21 January 2022 (UTC)

Expand logs

The logs section includes a number of useful categories of firewall behavior. It would be worth expanding these beyond just logs into fuller descriptions e.g., URL filtering. Tule-hog (talk) 04:03, 18 September 2024 (UTC)

See also Internet filter § Types of filtering. Tule-hog (talk) 04:06, 18 September 2024 (UTC)
Categories: