A firewall is a device offering network security which is responsible for granting or rejecting the access over network when flow of traffic happens between a trusted region and an untrusted area over the web. The firewall is responsible for acting as a point of demarcation or a cop of traffic within the network as every communication needs to flow from it and this is the area where traffic is given access or access is rejected (Wu and Shan 39). Access controls are enforced through firewalls using a model for positive control stating that only the defined traffic within the policy of firewall is permitted over the network but the remaining traffic is not allowed.
There has been a major evolution of firewall technology for maintaining pace with the continuously changing needs of security. Major difficulties can be faced in envisioning a globe in the absence of firewalls. Established initially as an approach to allow or restrict external accessibility to specific resources of the network, current capability is enjoyed by firewalls to enforce policies of network security, internet activity of logging and security of business exposure to external threats (Kaur and Rao 77). Firewalls can be identified as extremely effective to support strong authentication of user, enforce policies of network society and activity of internet based logging. Companies consider the utilization of firewalls as the defense of network perimeter for making efficient decisions of security and protecting all hosts from external attacks on private networks. From this point, the firewall of an organization ends up becoming the sole zone of risk from the attacks on internet, while hosting the safety of internet based work.
However, firewalls are not effective in protecting the hosts in connection with internet network without being involved with the enterprise firewall (Jadhav and Agrawal 753-756). The use of internet connection without any reliability upon the infrastructure of company results in exposing the user or host from any specific attack. Firewalls end up offering weak protection against threats or attacks unknown like Trojans or malware. However, it can be successful in complementing anti-virus solutions by the dynamic settlement of new rules on the basis of malware behaviour under observation. Even though there can be deployment of firewalls can take place as hardware and software appliances, these systems have the ability of performing real-time introspection of network traffic without any throughput affected (Budka et al. 209-225). A major combination of rules consistently filtering packets of data finally affects the performance of network further causing bottlenecks. In the future, firewall should be discerning between illegitimate and legitimate traffic for the identifying and plugging new threats automatically. Capabilities of anti-malware scanning are not beyond the capabilities of the firewall in the current era, but the present performance of network affects the crucial needs.