Distributed Firewalls are resident security software applications that can protect enterprise servers against unwant intrusion. Firstly, it will enforce a network domain security policy through policy language. Secondly, it secures networks by protecting endpoints where hackers will try to penetrate.
Issues that lead to Distributed Firewalls
Let us look at some issues of conventional firewall that lead to Distributed Firewalls:
- Firstly, it depends on network topology.
- Secondly, conventional firewall does not protect from internal attacks.
- Thirdly, it will not be able to handle Real Audio and FTP protocols.
- Not able to dynamically open and close networking ports.
- Has single entry point
Components of Distributed Firewall
- A central management system for creating policies.
- A transmission control system to transmit the policies.
- Client end implementation of designed policies.
Approach to Firewall Design
Due to dramatic increase in network development of new technologies like wireless networks, it is difficult to maintain a fixed network topology. In addition, there is increasing demand like mobility, security and reliability. As a result conventional firewalls were not sufficient.
Hence, to remove such problems, we have distributed firewalls. It enforces the policy rules at the endpoint rather than single entry point to network. And security policies are defined centrally.
Moreover, there are three notions on which these are based. Let us take a look.
- Firstly, Policy language: Important to define what kind of connections are allowed or rejected.
- Secondly, system management tools like Microsoft’s SMS.
- Thirdly, network level encryption mechanisms for TCP/IP
Benefits of Using Distributed Firewalls
- Firstly, Topological independence is one of the main benefits. It provides more flexibility for defining security parameter. In addition, security parameter can cover remote hosts and networks easily.
- Problems like traffic congestion and performance bottleneck are resolve using these firewalls.
- Filtering of protocols like FTP is easier on distributed firewalls since information is available at the decision point.
- Security policy rules are establishing as on need.
- End o end encryption is possible without affecting network security in systems. This improves security of distributed firewall.
Major Drawbacks
- Compliance of security policy for insiders is one of the major issues. It is much harder to prevent it.
- It is difficult to implement intrusion detection system in a distributed firewall environment.
Summary
In conclusion, we have learnt about the data security in local network using distributed firewalls. Also, we have seen the designing approach and the components of distributed firewall. At last, we have learnt about its benefits and major drawbacks.
[…] –IPSEC is an example of a network-level encryption technique for TCP/IP. […]