Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Vimeo
    Let's Tech It Easy
    Subscribe Login
    • Homepage
    • About
    • Blog
      • Computers
      • Cloud
      • Gaming
      • Cyber Security
      • iPhone
      • Mac
      • Windows
      • Android
    • Contact
    • My Tickets
    • Submit Ticket
    Let's Tech It Easy
    Home»Cyber Security»Internet Society for Home Users – Enabling Firewall
    Cyber Security

    Internet Society for Home Users – Enabling Firewall

    ThanatchaBy Thanatcha5 May 2021Updated:28 July 2021No Comments6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    This blog is the second part of the Internet Security for Home Users series. Throughout this series, you will learn tips and tricks to keep your home internet secured with the use of network troubleshooting, modem configuration, firewall setup, and VPN usage, among others. This blog will cover everything you need to know about a firewall and how to enable it on your devices.

    What is a firewall?

    The term “firewall” refers to a partition designed to prevent the spread of fire. Similarly, on your computer, a firewall helps prevent unauthorized access to your devices and secure the data on your computers. While it filters malicious traffic requests on a network, it allows legitimate traffic through.

    What are the types of firewall architectures?

    Packet-Filtering Firewalls

    As the oldest kind of firewall architecture, packet-filtering firewalls create a checkpoint at a traffic router. The firewall checks on data packets coming through the router by checking – inspecting destination and origination IP address, parcel type, port number, and other data on the surface without reviewing its substance. It will drop any packet that does not pass the inspection.

    The benefit of packet-filtering firewalls is that it does not require a lot of resources and will not have a huge impact on your system performance. However, it is relatively easy for harmful data packets to bypass the inspection as it only reviews information of the surface level.

    Circuit-Level Gateways

    Like packet-filtering firewalls, circuit-level gateways can quickly inspect traffic without requiring much computing resources because they do not check the packet itself. It verifies the transmission control protocol (TCP) handshake to ensure that the packet is from a legitimate source.

    Since this type of firewall does not check the content of the data packets, it is possible for a packet with malware but with the right TCP handshake to pass through.

    Stateful Inspection Firewalls

    This type of firewall utilizes packet inspection technology and TCP handshake verification. The level of protection offered is greater than the two types of firewalls previously mentioned.

    However, these firewalls do put more of a strain on computing resources as well. This may slow down the transfer of legitimate packets compared to the other solutions.

    Proxy Firewalls

    Proxy firewalls, or sometimes called Application-Level Gateways or Cloud Firewalls, filter incoming traffic between your network and the traffic source at the application layer. The delivery of this type of firewall is a cloud-based solution or another proxy device. It will establish a connection to the traffic source and inspect the incoming data package instead of allowing a direct connection to the traffic source.

    Similar to the Stateful Inspection Firewalls, they inspect both the packet and the TCP handshake protocol. On top of that, proxy firewalls can perform deep-layer packet inspections and check and verify the contents of the packet to ensure that it contains no malware. It will only let the packet connect to the destination if the checking process approves the content of the packet. The proxy firewalls create an extra layer of protection between the origination source and the devices on your network. However, in exchange for better security, proxy firewalls can slow down your system due to all the extra steps required.

    Next-Generation Firewalls

    Among the many recently released firewalls are “next-generation” architectures. Some of their common features include deep-packet inspection, TCP handshake checks, and surface-level packet inspection. Next-generation firewalls may include other technologies such as intrusion prevention systems (IPSs) that automatically stop any attacks against your network. However, the term is not well-defined, so it is important to check what a next-generation firewall is capable of before investing in one.

    What are the methods of delivering firewall functionality?

    Generally, there are three methods of delivering the firewall functionality which is through hardware, the cloud, and software.

    Hardware Firewalls

    This kind of firewall requires a physical appliance that intercepts data packets and traffic requests before they are connected to the server of your home network. Hardware firewalls are especially good at securing the perimeter and prevent traffic with malware before the endpoints are put at risk. The drawback of this category of firewall functionality is that its capacity to handle simultaneous connections is limited so insider attacks can bypass them.

    Cloud Firewalls

    A cloud firewall, or firewall-as-a-service (FaaS), or proxy firewalls mentioned in the previous section. This is because many of the proxy firewalls are cloud-based. A major benefit of cloud-based firewalls is that they are scalable, meaning that their capacity can be increased to filter larger traffic loads. Similar to hardware firewalls, cloud firewalls excel at perimeter security. This option is more suitable for organizations and not home users. For more information, please do not hesitate to contact BITS.

    Software Firewalls

    This category covers any type of firewall applications installed on your devices that does not require any hardware or a cloud server to function. By isolating individual network endpoints from one another, it can help create a line of defense.

    However, it is important to check the compatibility of the firewall and your device because it is not a one-size-fits-all type of situation. Also, maintaining individual software firewalls on different devices can be time-consuming. Below are simple ways to turn the firewalls on and off for both Windows and Mac. If you find it complicated, please feel free to contact a specialist here.

    How to check whether your firewall is on?

    Regardless of the operating systems, your devices do come with their firewalls. There is one main difference in firewall protection between Windows and Mac. Mac’s built-in firewalls are off by default because, unlike Windows systems, Macs are not prone to worms infection.

    For Windows, you can check the status of your firewalls by following these steps:

    1. Start > Windows Start Screen > Settings

    2. Click the Update & Security > Windows Security

    3. Click Firewall & network protection

    Upon completing the third step, you will see whether your firewall is on for domain, private, and public networks as well as the option to enable and disable.

    For Mac, you can simply enable the firewall protection by following these simple steps:

    Choose Apple menu > System Preferences

    Click Security & Privacy > Firewall

    Note: if there is a lock icon present at the bottom left, you have to first unlock the preference pane.

    Click Turn On Firewall

    Firewall
    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleOSI MODEL.
    Next Article Internet Security for Home Users – VPN 101
    Thanatcha

    Related Posts

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025

    Basic Differences Between MacOS and Windows 10: Which One is Right for You? 

    19 February 2025

    Mastering Windows Registry: Tips for Power Users

    29 May 2024
    Leave A Reply Cancel Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Demo
    Our Picks
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Business

    Windows 10 End of Service: What Must Be Done

    By Uneeb19 March 20250

    On October 14, 2025, Microsoft will officially end support for Windows 10, signalling a major shift…

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    You too can join us

    If you also think about technology and want to contribute either as a mentor or even from a learner’s perspective, look no further and join us. Write us at info@letstechiteasy.com and share your opinion. Our team will get back by sending you an invite to join the platform as a contributor. Empower others, empower yourself so each one of us can play with the technology safely one day without being scared.

    Subscribe Here
    Loading
    For Partnership Worldwide

    Contact:

    partner@letstechiteasy.com

     

    About Us
    About Us

    “Let’s Tech It Easy” or popularly known as “LTIE” is the blogging platform for everyone who wants to share and learn about technology. It is an initiative by the serial techpreneur Vish when he realized the wide gap between the pace at which the technology is evolving and at which it is getting adopted by a wider audience.

    Email Us: support@benchmarkitservices.com

    Latest Posts

    Upgrading RAM

    10 March 2023

    Desktop Vs Laptop

    10 March 2023

    Data Recovery

    3 March 2023

    MacOS on Windows Virtual Box

    10 February 2023

    macOS Monterey and what’s new in it?

    12 April 2022
    New Comments
    • How to Troubleshoot Sound and Mic on Windows 10 - Let's Tech It Easy on How to Access Troubleshooters on Windows 10
    • How to Stay Safe While Using Public Wi-Fi Networks - Let's Tech It Easy on Internet Security for Home Users – VPN 101
    • How to Set up Oracle VirtualBox on a Mac - Let's Tech It Easy on How to Install Windows 10 on a Mac Using Boot Camp Assistant
    • DoS Attack Implementation and Prevention in Ubuntu – Let's Tech It Easy on Top Kali Linux Commands
    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About
    • Blog
    • Contact
    • Computers
    • Cloud
    • Gaming
    • Cyber Security
    • iPhone
    • Mac
    • Windows
    • My Tickets
    • Submit Ticket
    © 2025 LetsTechitEasy. Designed by Sukrit Infotech.

    Type above and press Enter to search. Press Esc to cancel.

    Sign In or Register

    Welcome Back!

    Login below or Register Now.

    Lost password?

    Register Now!

    Already registered? Login.

    A password will be e-mailed to you.