期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
印刷版ISSN:2277-6451
电子版ISSN:2277-128X
出版年度:2012
卷号:2
期号:7
出版社:S.S. Mishra
摘要:Any data passes through a internal network to an external network there are lot of vulnerable attacks are possible to hack or damage the data. One type of network attack is unauthorised penetration in to network due to openness of networks. It is possible to hack the data and resources of networks. Firewall is the suitable mechanism to protecting the website from attackers. It acts as a security guard between a private network and the outside Internet such that all incoming and outgoing packets have pass through it. Working of a firewall is to examine every incoming or outgoing packet and to decide whether to accept or discard it. This function is conventionally specified by a sequence of rules. Most of the threat attacks are attained only by a misconfiguration of firewall rules. A misconfigured firewall will, almost certainly only provide the illusion of network security and it will give adverse effect of legitimate traffic. So we can focus the firewall policy it is a basement for firewall rule generation. The firewall policy orders how the firewall should handle network traffic for specific IP addresses and address ranges, protocols, applications and content types based on the organisation's information security policies