What a firewall Protects You From



There are times that you may want remote users to have access to items on your network.
Some examples are:
-Web server
-SMTP server
-FTP server

In cases like this, you may want to create a DMZ (Demilitarized Zone).It is just an area that have
less restrictions to be accessed from the external users.

Many topologies are used to setup a DMZ area ,we choose 2 typical topologies :
1- Screened subnet topology
2- Multihomed topology (triple homed)

Where, Each firewall can support one or more of the functions described below.
-Static packet filters
-stateful filtering or stateful inspection
-A proxy is a software
-Network Address Translation (NAT)

1- Screened subnet topology

The most secure (and most expensive) option .In this case, the DMZ is placed between
two firewalls from two different vendors,(for better security performance).

2- Multihomed Firewall topology

This solution allows organizations to offer services securely to Internet users.Any servers
that host public services are placed in the Demilitarized Zone (DMZ),which is separated from
both the Internet and the trusted network by the firewall.
Therefore, if a malicious user does manage to compromise the firewall, he or she does not have
access to the Intranet ( providing that the firewall is properly configured).


  What a Firewall protects you from  ... Checkpoint firewall  

Resources:

http://www.howstuffworks.com/firewall.htm
http://www.more.net/technical/netserv/tcpip/firewalls/index.html
http://www.infomusic.it/infomusic/Sic/FirewallProxy.aspx
http://searchsecurity.techtarget.com