Open In App

Packet Filter Firewall and Application Level Gateway

No one can deny the fact that the dynamic rise of the Internet has brought the world closer. But at the same time, it has left us with different kinds of security threats. To ensure the confidentiality and integrity of valuable information of a corporate network from outside attacks, we must have some robust mechanism. This is where the Firewall comes into the picture. 



It can be compared with a security guard standing at the entrance of a minister’s home. He keeps an eye on everyone and physically checks every person who wishes to enter the house. It won’t allow a person to enter if he/she is carrying a harmful object like a knife, gun, etc. Similarly, even if the person doesn’t possess any banned object but appears suspicious, the guard can still prevent that person’s entry. 

The firewall acts as a guard. It guards a corporate network acting as a shield between the inside network and the outside world. All the traffic in either direction must pass through the firewall. It then decides whether the traffic is allowed to flow or not. The firewall can be implemented as hardware and software, or a combination of both. 
 



Packet Filters –

Packet filter firewall

Application Gateways –

Application level gateway

It works as follows:

Step-1: User contacts the application gateway using a TCP/IP application such as HTTP.  

Step-2: The application gateway asks about the remote host with which the user wants to establish a connection. It also asks for the user id and password that is required to access the services of the application gateway.  

Step-3: After verifying the authenticity of the user, the application gateway accesses the remote host on behalf of the user to deliver the packets.

Difference :

Packet filter Application-level
Simplest Even more complex
Screens based on connection rules Screens based on behaviour or proxies
Auditing is difficult Activity can audit
Low impact on network performance High impact on network performance
Network topology can not hide Network topology can hide from the attacker
Transparent to user Not transparent to the user
See only addresses and service protocol type Sees full data portion of a packet

 

Article Tags :