FortiGate Firewalls - The FortiGate Firewall Protects Your Network By Taking The Various Components
Most people have at one time or another played with the children's toy system that is made up of interlocking blocks.
(prHWY.com) February 10, 2013 - Florida, FL -- Florida, Feb 11, 2013 - The FortiGate firewall protects your network by taking the various components and using them together to build a kind of wall or access control point so that anyone that is not supposed to be on your network is prevented from accessing your network in anyway other than those approved by you. It also protects your network from itself by keeping things that shouldn't happen from happening and optimizing the flow of traffic so that the network is protected from traffic congestion that would otherwise impede traffic flow.
Most people have at one time or another played with the children's toy system that is made up of interlocking blocks. The blocks come in different shapes and sizes so that you can build structures to suit your needs and in your way. The components of the FortiGate firewalls are similar. You are not forced to use all of the blocks all of the time. You mix and match them to get the results that you are looking for. You can build a very basic structure that's only function is to direct traffic in and out to the correct subnets or you can build a fortress that only allows specific traffic to specific hosts from specific hosts at specific times of day and that is only if they provide the credentials that have been pre-approved and all of the traffic is encrypted so that even when the traffic is out on the Internet it is private from the world. Just like the
interlocking blocks, what you build is up to you, but chances are if you put them together the right way there isn't much that can't be built.
A computer has a request for information. The packets are sent to the designated resource but before they can get there they are blocked by the proxy server saying that it will take the request and pass it on. The Proxy Server processes the request and if it is valid it passes onto the designated computer. The designated computer gets the packet and processes the request, sending the answer back to the proxy server. The proxy server sends the information back to the originating computer
The term firewall originally referred to a wall intended to confine a fire or potential fire within a building. Later uses refer to similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment. A firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted.
About the Author:
FortiGate Firewalls - Modcomp is a technology company that evaluates its clients' current technologies, and creates aligned solutions for their unique environment. Modcomp offers implementation services, network design, user training, and product maintenance for all hardware and software environments through a highly trained and skilled team of technical and sales experts.
Contact Details
MODCOMP, Inc
1500 S. Powerline Rd.
Deerfield Beach, FL 33442
Phone: (800) 940-1111
###