Firewall (computing): Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
Altered template type. Add: isbn, pages, doi, date, authors 1-2. Removed parameters. | Use this bot. Report bugs. | Suggested by Headbomb | Linked from Wikipedia:WikiProject_Academic_Journals/Journals_cited_by_Wikipedia/Sandbox2 | #UCB_webform_linked 84/309
Line 53:
[[Marcus Ranum]], Wei Xu, and Peter Churchyard released an application firewall known as Firewall Toolkit (FWTK) in October 1993.<ref>{{cite web |url=http://www.avolio.com/papers/FWTKv1.0Announcement.html |title=Firewall toolkit V1.0 release |access-date=2018-12-28}}</ref> This became the basis for Gauntlet firewall at [[Trusted Information Systems]].<ref>{{cite web |url=https://blogs.gartner.com/john_pescatore/2008/10/02/this-week-in-network-security-history-the-firewall-toolkit/ |archive-url=https://web.archive.org/web/20160429131516/http://blogs.gartner.com/john_pescatore/2008/10/02/this-week-in-network-security-history-the-firewall-toolkit/ |url-status=dead |archive-date=April 29, 2016 |title=This Week in Network Security History: The Firewall Toolkit |author=John Pescatore |date=October 2, 2008 |access-date=2018-12-28}}</ref><ref>{{cite web| url=http://www.avolio.com/papers/fwtk-history.html| title=FWTK history| author1=Marcus J. Ranum| author2=Frederick Avolio}}</ref>
 
The key benefit of [[application layer]] filtering is that it can understand certain applications and protocols such as [[File Transfer Protocol]] (FTP), [[Domain Name System]] (DNS), or [[Hypertext Transfer Protocol]] (HTTP). This allows it to identify unwanted applications or services using a non standard port, or detect if an allowed protocol is being abused.<ref>{{Cite web|title=What is Layer 7? How Layer 7 of the Internet Works| url=https://www.cloudflare.com/learning/ddos/what-is-layer-7/ | access-date=Aug 29, 2020| website=Cloudflare}}</ref> It can also provide unified security management including enforced [[DNS over TLSHTTPS|encrypted DNS]] and [[virtual private network]]ing.<ref>{{Cite web|title=5 Firewall Features you Must-Have|url=https://www.checkpoint.com/cyber-hub/network-security/what-is-firewall/5-firewall-features-you-must-have/|access-date=2021-11-08|website=Check Point Software|language=en-US}}</ref><ref>{{Cite web|last=Stanfield|first=Nathan|date=2019-12-04|title=11 Firewall Features You Can't Live Without|url=https://www.stanfieldit.com/11-firewall-features/|access-date=2021-11-08|website=Stanfield IT|language=en-AU}}</ref><ref>{{Cite web|title=Safing Portmaster|url=https://safing.io/portmaster/|access-date=2021-11-08|website=safing.io}}</ref>
 
As of 2012, the [[next-generation firewall]] provides a wider range of inspection at the application layer, extending [[deep packet inspection]] functionality to include, but is not limited to: