StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Inbuilt Linux and Windows Firewall - Essay Example

Cite this document
Summary
This paper 'Inbuilt Linux and Windows Firewall ' tells that Windows and Linux are two of the most commonly used operating systems in the world. Linux is a widely available operating system that is accessible, and open source with many users. The most significant difference between these operating systems is its open-source nature…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Inbuilt Linux and Windows Firewall
Read Text Preview

Extract of sample "Inbuilt Linux and Windows Firewall"

Inbuilt Linux and Windows Firewall s 22nd February Introduction Windows and Linux are two of the most commonly used operating systems in the world. Linux is a widely available operating system that is accessible, flexible and open source with many users. The most significance difference between Linux and Windows operating system is its open source nature. Open source encourages speedy discovery and reporting of security threats through a peer-reviewed system. The peer-reviewed structure is thorough and covers trivial issues that are unlikely to be exploited by a hacker of attacker (Sawicki, 2006). If a security problem is discovered, it is immediately fixed before anyone suffers from an attack. In comparison with the closed nature of Windows operating system where security flaws are reported after a successful attack. In the Windows platform, security through obscurity is employed as an effort of bringing down the number of attacks. But, it has been discovered that this tactic exposes a large base of users to attack when the secret leaks out. The number of attacks on Windows based platform proves that this tactic does not work. Firewalls Basic Functionalities and Configuration of a Linux Firewall Linux operating system utilizes IP tables that are highly flexible, they are easy to use and are ideal for Linux novice users. IP tables is a firewall that is controlled by a command line and uses the policy chains from the user to block or allow traffic. When an incoming connection makes an attempt to establish itself on the system, IP tables contains a list of rules where it searches for a match to tie it to. If the IP tables fails to find a rule, it performs the default action. IP tables are pre-installed on any Linux based operating system, to update and install, the user can retrieve the IP tables package by typing; Sudo apt-get install IP tables. Linux also comes with a graphic user interface (GUI) for IP tables such as Firestarter. Using the command line requires caution from the user especially through the first few commands. To prevent lockout from SSH servers, the user should take caution when configuring rules for IP tables. Types of Chains IP tables uses three types of chains, they are; input, output and forward. Input; this chain controls the behaviors of all incoming connections. For instance, if a user attempts to SSH to a personal computer or a server with IP tables. His or her user’s Internet protocol address (IP) and port will be matched to a rule found in the input’s chain. Forward; used for incoming connections that are not delivered locally.Outputs; used for outgoing connections like pinging other websites. IP tables will run a check on its output chain to discover the rules of the ping action and the site before allowing or denying any connection attempt. Before configuring specific rules, the user must decide the default behavior of each of the three chains. To check what the IP tables policy chains are configured to do with the unmatched traffic, run IP tables –L command. The system should be configured to accept connections, for example; IP tables –input ACCEPT. This allows the user to direct the IP tables to deny precise parts or IP addresses while accepting other connections. If the user wishes to deny all connections but manually select the ones to connect or allow, the default policy should be changed to DROP. For example, IP tables –policy OUTPUT DROP on the command line. This action is very useful for servers that contain sensitive data and also with the same IP addresses connecting to them (Howtogeek.com, 2015). After configuring the policy chains, the user can configure IP tables to block or allow specific addresses, ports and address ranges. The user can switch between accept or reject depending on how the policy chains are configured or according to his or her needs. To prevent all connections coming from the IP address 11:11:11:11; IP tables –A INPUT –S 11:11:11:11 –j DROP. To block all IP addresses in the 11:11:11:11/24 network range, the user, can use a netmask to specify a range of IP addresses. To save changes made to the IP tables run; Sudo /sbin/IP tables-save. A lot of protocols require two-way communication. To allow SSH connections to the system, the output and input chains need a rule added to them. Connection states allow two-way communication but allow one-way connection (Howtogeek.com, 2015). Windows Firewall Windows contains an easy to use firewall protecting your personal computer from inbound traffic. For example; the inbuilt Windows seven has powerful options and also contains an advanced interface for system administrators. Inbound Traffic Windows seven’s firewall is made to run with little user input. The firewall prompts the user when a program acts as a server and also specify’s whether the network is a work, public or home network. If a program wants to accept incoming connections from the Internet, Windows firewall will block incoming connections and ask whether to allow or block them. Users ca control from firewall with Windows firewall control panel that is located under system and security found in the control panel. To control programs that are allowed to access the world wide web, click on Allow a program or a feature through Windows firewall that appears on the left-hand side of the desktop. By clicking the change settings options, users can check the boxes to choose which programs that will receive connections on public or private networks. The user can also click on allow another program button to allow specific programs to accept Internet access (Hoffman, 2012). Outbound Traffic The Windows seven firewall allows programs to create outgoing connections to the Internet without the user’s confirmation. The Windows seven firewall does not prompt the user when a program wants to access the Internet. To access this feature, click on advanced settings inside the control panel. At the advanced settings option, select outbound rules and choose a new rule. The user can select the wizard to specify the programs and click to block this connection. Users can prevent any program from the prompt that appears every time a program attempts to access the Internet. Advanced settings allow the creation of rules and filter traffic based on IP addresses, ports and associated programs (Hoffman, 2012). Comparing Windows and Linux Firewall The Linux firewall has functionalities and capabilities that rival commercial firewalls. The rules allow extensive control over stateful and stateless packet filtering. Linux firewall is extensible and allows new user capabilities as the need arises. Linux is a network administrator’s dream, it allows port translation and packet mangling. It also allows translation proxies, policy routers and sophisticated quality of service (QoS). The firewall on Linux has a lot of functionalities that challenges simple interfaces. It’s only drawback is the configuration part that would create a challenge even to window’s administrators. Windows firewall allows the blocking and unblocking of all the connection requests. It blocks computer viruses, worms and creates a log of successful and unsuccessful attempts to connect to the personal computer. Windows firewall is easily customizable and easy to configure and by default, it blocks all incoming traffic. Windows firewall allows users to add ports that allow traffic from networks (Jeremiah, 2015). Windows offers thorough traffic blocking that protects both the user and the administrator. The Windows firewall automatically turns itself on, coordinates with security center, offers boot time security and protects the hard drives. The main disadvantage of a Windows firewall is itss failure of the leak test. This means that the user’s data can leak through the firewall; it does not match up to commercial firewall products. Conclusion Using a firewall on Windows and Linux platforms is the best option. Firewalls can protect the system from attacks. The Linux firewall is much more complex and offers more functionality than the Windows inbuilt firewall. Linux firewall can match up to third party Windows firewalls. On the other hand, the Windows firewall is easy to use making it ideal for novice users. On the Linux system, configuring the firewall requires extreme caution especially if one is connected to a server. Working with the command line requires a high level of profesionalism from the user and this type of configuration is unsuitable for novice users. Overall, Linux’s inbuilt firewall is much better compared to Windows inbuilt firewall. References Hoffman, C. (2012). Windows 7 Firewall: How It Compares Against Other Firewalls. MakeUseOf. Retrieved 22 February 2015, from http://www.makeuseof.com/tag/Windows-7-firewall-compares-firewalls/ Howtogeek.com,. (2015). The Beginner’s Guide to IP tables, the Linux Firewall. Retrieved 22 February 2015, from http://www.howtogeek.com/177621/the-beginners-guide-to-IP tables-the-linux-firewall/ Jeremiah, S. (2015). What Are the Benefits of Windows Firewall? | eHow. eHow. Retrieved 22 February 2015, from http://www.ehow.com/list_6101045_benefits-Windows-firewall_.html Sawicki, E. (2006). Windows vs. Linux Security. Biznix.org. Retrieved 22 February 2015, from http://www.biznix.org/articles/winlinsecure.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Inbuilt Linux and Windows Firewall Essay Example | Topics and Well Written Essays - 1250 words, n.d.)
Inbuilt Linux and Windows Firewall Essay Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/information-technology/1861234-windows-vs-linux-firewalls
(Inbuilt Linux and Windows Firewall Essay Example | Topics and Well Written Essays - 1250 Words)
Inbuilt Linux and Windows Firewall Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1861234-windows-vs-linux-firewalls.
“Inbuilt Linux and Windows Firewall Essay Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/information-technology/1861234-windows-vs-linux-firewalls.
  • Cited: 0 times

CHECK THESE SAMPLES OF Inbuilt Linux and Windows Firewall

Introduction to Firewall in Linux-Based Systems

In this paper, we will have a short introduction to firewall in Linux based systems.... We will discuss the way we can use IP Tables to set firewall rules in Linux environment and we will aim to an IP Table firewall definition for a system that requires some special settings.... hellip; We will apply these rules to Linux firewall and we will discuss how these rules impact the system.... For more convenience and more security in the system, we will also make the rest of the rules as security focused (and sensible) as possible. "iptables" is Linux firewall which has been a part of the kernel since version 2....
4 Pages (1000 words) Essay

Windows Vs Linux

The basic similarities between linux and windows.... In regard to windows and Linux, the two platforms differ in the ways of development and overall price.... hellip; windows platform was developed as a closed source platform, whereas Linux was developed as open source.... When a computer program is open source, it means that all users can edit the windows vs.... Linux windows and Linux are separate computer platforms....
2 Pages (500 words) Research Paper

The Difference and the Disadvantage of the Windows Platform and Linux

Viruses and worms are far rarer in linux and OSX than in Windows.... Linux is universally held as a very solid OS and much preferred as server and firewall system.... The purpose of this paper is in comparing windows 2000 and Linux.... windows 2000, OSX and Linux are all related to the popular UNIX operating system.... For the purpose of this paper – in comparing windows 2000 and Linux – I would take the perspective of the general user, assessing three important factors: security, cost and application support....
1 Pages (250 words) Assignment

Firewall Applications

A firewall is a software/hardware tool that is used to protect a computing device from malware/other malicious software or Trojan horses' intrusion.... These external threatening agents often attack a computing device when it is connected to another external computing device that… This connection may be via a network etc. firewall prevents unauthorized access to a computing device by checking every message transfer to and from the computing device.... It restricts any message transfer that does not comply with the defined firewall Applications Submitted to, Submitted By, of the Submitted on, [November 6th, INTRODUCTION A firewall is a software/hardware tool that is used to protect a computing device from malware/other malicious software or Trojan horses' intrusion....
2 Pages (500 words) Essay

Window and linux updates/patches Wk 6

Most of us are aware that our copies of windows or Linux need to be periodically updated with the latest patches.... You only need to visit the site to check for windows or Linux Up s/Patches Week 6 windows or Linux Up s/Patches Week 6 Most of us are aware that our copies of windows or Linux need to be periodically updated with the latest patches.... What else do you, or should you, update other than windows itself?...
2 Pages (500 words) Essay

Commercially Available Firewalls

Application-Layer firewall, is the type of firewall that can address the vulnerabilities faced by NBK bank, since once the Application-Layer firewall is installed, it will safeguard the bank's data, since this type of firewall prevent all unwanted outside traffic from reaching protected machines (Venkatesulu & Kumar, 2012).... This type of firewall works towards monitoring all browser traffic, or all telnet traffic, and intercepts or blocks the packets that do not match the set data traffic rules, since they are considered to be intrusive (Venkatesulu & Kumar, 2012)....
1 Pages (250 words) Essay

Honeypots and Firewalls

According to Zwicky, Cooper and Chapman (2000), a firewall is characterized by diverse security ranks on the basis of the position and situation of the computer, security or safeguarding of wireless grids and systems such as Wi-Fi.... A firewall is used within an organization to stipulate the kind of drivers and packages fitted in a particular computer that should contact the complex system, stops intrudes or aggressors trying to attack the computer, and as well blocks any unwanted programs....
2 Pages (500 words) Assignment

Firewall and Service Management on Linux

The author of this essay "firewall and Service Management on Linux" casts light on the network statistics which is a command line utility for monitoring network connections both inbound and outbound.... The netstat command helps us to deal with network issues in linux....
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us