The need for security to the networks has become a key point towards the accelerated growth of internet usage. A secure network can prevent a user from hacking or other miss-usage of network protocol and this network security can only be achieved with the help of firewall. Firewall is that hardware or software which is specially designed to allow or refuse transmission of a network, which is based on certain protocols. However, traditional and conventional firewalls strictly depend on the restrained entry points to the function and restricted topology.


Setting up of firewall

A firewall is set up in order to block all malicious activities, which are performed globally. In order to restrict the usability, the firewalls are set.

Figure 1: Firewalls showing all connections are blocked in my system

(Source: Bares et al. 2016, p.13)

Configuration of Firewall

A firewall is configured to either allow or block the network connections. The blocking mechanism is documented below.

Figure 2: Blocking of Ping

(Source: Kuzkin et al. 2014, p.31)

Testing of Firewall

The firewalls generally come with a basic default setting where it either allows all network connections to let in or refuses the same total. However, these are tested in respective environments such as Linux and Windows in order to see the strength of them.

The main usage of the Firewall

 INFO SECURITYFirewalls are a strong system of network security, which prevents unauthorised access from or to a private network. It can be utilised as both software as well as hardware too or even as a combination of both. In order to prevent unauthorised users to access the private networks (being connected to the internet), these Firewalls are extensively used on a wide margin. All the various types of messages, which are leaving or entering the intranet generally pass through the firewall. The main usage of this Firewall is to determine and examine these messages or information and then block its access if the Firewall finds out any insecure data.

Now coming to the combination of Hardware and Software Firewall, these can be in either form that is in hardware or software. However, it would be a lucrative combination if the firewall consist the both (Border et al. 2017, p.18). These firewalls allow the users to gain remote access through authentic and secure logins and certificates. Moreover, these are found in routers of broadband connection systems and are an important measure of the security of the systems too. Generally, the hardware firewalls have four ports of network connectivity in order to connect other computers, where for a broader and a larger connection, the only solution is to obtain business networking firewall.

Limitations of the Firewall

Firewalls limit the access to the computer and the network.

  • A firewall does not have the provision to prevent the attackers or the hackers with modems who intent to access other private networks by a dial-up connection or even out of the internal connection, which as a result enables to bypass the firewall and also enhance to bypass its protection too (Bugenhagen et al. 2017, p.19).
  • These firewalls are also inactive during non-technical risks of security, which includes social engineering.
  • Firewalls are unsuccessful if the user takes poor decisions.
  • Firewalls are also unsuccessful in case the policies of security which are too low.
  • Firewalls are unable to prevent if there is any misuse of the passwords. These are the faults of the users if the user cannot manage and protect passwords.
  • Another major disadvantage of this Firewall is that it is helpless or rather to say it is unsuccessful in stopping internal users from accessing or using the websites with several malicious codes, which may risk the system of the user.

Security holes of the Firewall

  • Insecure Remote Access

Hackers generally obtain data by the use of remote access, and it is still the best method in the world to gain access to others’ data (Larson et al. 2015, p.24). Since remote access can give a major advantage to a business, however, it can be detrimental too, which can ruin the whole business as it opens a route for the hackers to collect the data if these firewalls are not properly secured.

Some tips for the remote access, which includes:

  1. Using a Virtual Private Network (VPN)

Virtual Private Network or VPN provides an additional layer of security to the remote access, thereby ensuring that the hackers are unable to access the private network.

  1. Restriction of access

If there is any requirement to share the accessibility, then it will be better to share with a limited number of personnel apart from sharing with the others.

  1. Using multi-factor authentication

Multi-factor authentication helps the user to be on a safer side as the hackers can easily track down the username of the network by a random guess and then start to hunt for the passwords by using Brute Force Mask Attack.

Figure 3: Tips for secured Remote Access

(Source:, 2016)

  • Lack of usage of latest updated software

There is always a requirement to update the software in order to prevent any misuse of the data. Hence, it is of that, much importance to use authenticates software so as to get updates periodically (Burch et al. 2018, p.21). If there is a bigger update of any patch file, then the user needs to ensure that the update has affected the technology within thirty days of the release in the patch. It will ensure proper security to the system as well as the computer is also not vulnerable to attack. One more thing to keep in mind is that the user should use unique passwords for their own safety only, rather say that they should not use any dictionary passwords too.

  • Misconfiguration of Firewalls

Forensic investigators of Security Metrics had investigated and found that 65% of the breached cases did not have the proper framework of a well-configured firewall. This lack of configuration of the firewalls typically weakens and affects its usage in a negative excessively. Many users or business think that if they can just plug in the firewall in their system, then all are done, but that is a misconception (Voronkov et al. 2017, p.87). In most cases, these firewalls are designed and programmed in such a way that they do allow letting any traffic out or any traffic in the system, thus, the user needs to spend more times in order to judge the network and what type of rules needs to be configured for the traffic. However, there are also weaker firewalls, which generally comes with a default setting by letting most of the traffic out and in. it is also that much important to review the rules of the firewall on a regular basis.

  • Neglecting to review firewall logs

Reviewing the log files of the firewall simplifies keeping a guard on the top of a tower. Thus, it is the work of the guard to view if there is any danger on a priority basis every time. Similarly, if the user does not review the log file, it may lead to harm and may lead to danger. Keeping the firewall without paying attention to its notifications (if something needs to turn off or on) is just a useless.

  • Storage of unencrypted data

According to the latest study of PANscan Study, there is a huge number of stored unencrypted data, which is equivalent to 67%, whereas 5% store magnetic stripe information. A few tips, which involve the protection of the card data, which includes the following:

  1. Usage of P2PE validation

P2PE or Point to Point Encryption of data means proper encryption of the data at the swiping point until and unless the processor receives it (Hamlet et al. 2014, p.27). This validation ensures that there is no data breach.

  1. Consider Tokenisation

It is never recommended to store the details of the card by using latest technologies of tokenisation (Yadav, 2015, p.11). Thus, considering a third party to store and handle the information of the card helps to eliminate and reduce the risk of problems pertaining to potential security.

  1. Usage of network segmentation

It is highly recommended to keep the network, which deals with card activities separate from all another network, which performs other activities, which ensures to keep the data more secure.

  1. Limitation of access to data

There should be a limitation of users to access these data, as the number increases, the more vulnerability arises which can lead to leakage of data. 


This project had dealt with the several properties of firewall which can make a like easier, on the other hand, it can lead a life to misery too. A detailed analysis of setting up and configuring of the firewall had been analysed with its proper testing. After that, its features, usage, limitations, and security holes had also been discussed over here. These security holes can create a deep impact on the system, which may lead the system vulnerable to threats and attacks. However, if these firewalls can be utilised properly, then it helps the users to protect from external threats too.


Bares, W.H., M’raihi, D. and Duprat, E., Verayo Inc, (2016). Multi-factor authentication. U.S. Patent Application 14/294,142, pp.13

Border, J., Dillon, D. and Pardee, P., Hughes Network Systems LLC, (2017). Method and system for communicating over a segmented virtual private network (VPN). U.S. Patent 9,832,169, pp.18

Bugenhagen, M.K. and Wiley, W.L., CenturyLink Intellectual Property LLC, (2017). Pin-hole firewall for communicating data packets on a packet network. U.S. Patent 9,621,361, pp.19

Burch, L.L., Vaswani, G.G., Thangavel, S. and Peters, R., Micro Focus Software Inc, (2018). Multi-factor authentication. U.S. Patent Application 15/226,499, pp.21

Hamlet, J.R. and Pierson, L.G., National Technology and Engineering Solutions of Sandia LLC, (2014). Multi-factor authentication. U.S. Patent 8,868,923, pp.27 (2016), IJPTT-V22P402, Retrieved on 5th May, (2018) from:

Kuzkin, M.A. and Tormasov, A.G., Parallels IP Holdings GmbH, (2014). Method and system for remote device access in virtual environment. U.S. Patent 8,805,947, pp.31

Larson, V., Short III, R.D., Munger, E.C. and Williamson, M., VirnetX Inc, (2015). Method for establishing secure communication link between computers of virtual private network. U.S. Patent 9,094,399, pp.24

Voronkov, A., Iwaya, L.H., Martucci, L.A. and Lindskog, S., (2017). Systematic Literature Review on Usability of Firewall Configuration. ACM Computing Surveys (CSUR)50(6), p.87.

Yadav, S., (2015). Virtual Private Network, pp.11

Maddox Smith

Greetings for the day !
Hope that you’re well !

We want to introduce ourselves as a team of professionals who are into academic writing for the last 10+ years. We can provide assignment assistance in all subjects. Our experts can provide solutions across all the topics right from Management, HR, Marketing, Finance & Accounts, Statistics, IT, childcare, nursing, law, and general writing. We provide plagiarism free work and also send a ‘Turnitin’ report along with completed work. Our services are available at reasonable cost; we entertain amendment requests from clients without any extra charges.

Our Feature Included

Ø Every assignment includes graphical representation like pie chart, bar graph, smart art and all.
Ø Free 0% plagiarism report
Ø Expert team for technical work as well.
Ø On time delivery
Ø Multiple rework facility
Ø Huge team of expert in each subject
Ø Referencing like: Harvard, APA, MLA, Oscola, automatic referencing all are familiar to our experts.

Subject we cover: Math , finance, economics, accounts, civil engineering, mechanical engineering, IT, Computer science, electrical and electronics engineering, history, geography, political science, sociology, physiology, philosophy, biology, microbiology, biotechnology, biotechnology, B-school assignments, project report, psychology, nursing assignments, medical assignments, Tourists and travelling assignments all kinds of dissertation and so on

Best Regards:
Oz Paper Help
WhatsApp:+1 585-666-2225
1 Step 1