educational

An Introduction to Firewalls: Part 1

There has been a lot of talk lately about computer (in)security, along with the use of anti-virus software and network firewalls as means of mitigating unwanted intruders and their malicious attacks. While most Webmasters understand anti-virus software, many are unfamiliar with firewall basics, a situation that this introduction hopes to address.

Before being able to understand firewalls, it's important to understand the basic principles that make them work:

What is a network firewall?
A firewall is a system or group of systems that enforces an access control policy between two networks. The actual means by which this is accomplished varies widely, but in principle, the firewall can be thought of as a pair of mechanisms: one which exists to block traffic, and the other which exists to permit traffic. Some firewalls place a greater emphasis on blocking traffic, while others emphasize permitting traffic. Probably the most important thing to recognize about a firewall is that it implements an access control policy. If you don't have a good idea of what kind of access you want to allow or to deny, a firewall really won't help you. It's also important to recognize that the firewall's configuration, because it is a mechanism for enforcing policy, imposes its policy on everything behind it. Administrators for firewalls managing the connectivity for a large number of hosts therefore have a heavy responsibility.

Why would I want a firewall?
The Internet, like any other society, is plagued with the kind of jerks who enjoy the electronic equivalent of writing on other people's walls with spraypaint, tearing their mailboxes off, or just sitting in the street blowing their car horns. Some people try to get real work done over the Internet, and others have sensitive or proprietary data they must protect. Usually, a firewall's purpose is to keep the jerks out of your network while still letting you get your job done.

Many traditional-style corporations and data centers have computing security policies and practices that must be adhered to. In a case where a company's policies dictate how data must be protected, a firewall is very important, since it is the embodiment of the corporate policy. Frequently, the hardest part of hooking to the Internet, if you're a large company, is not justifying the expense or effort, but convincing management that it's safe to do so. A firewall provides not only real security, it often plays an important role as a security blanket for management.

Lastly, a firewall can act as your corporate "ambassador'' to the Internet. Many corporations use their firewall systems as a place to store public information about corporate products and services, files to download, bug-fixes, and so forth. Several of these systems have become important parts of the Internet service structure (e.g.: UUnet.uu.net, whitehouse.gov, gatekeeper.dec.com) and have reflected well on their organizational sponsors.

What can a firewall protect against?
Some firewalls permit only email traffic through them, thereby protecting the network against any attacks other than attacks against the email service. Other firewalls provide less strict protections, and block services that are known to be problems.

Generally, firewalls are configured to protect against unauthenticated interactive logins from the "outside'' world. This, more than anything, helps prevent vandals from logging into machines on your network. More elaborate firewalls block traffic from the outside to the inside, but permit users on the inside to communicate freely with the outside.

Firewalls are also important since they can provide a single "choke point'' where security and audit can be imposed. Unlike in a situation where a computer system is being attacked by someone dialing in with a modem, the firewall can act as an effective "phone tap'' and tracing tool. Firewalls provide an important logging and auditing function; often they provide summaries to the administrator about what kinds and amount of traffic passed through it, how many attempts there were to break into it, etc. A company rarely has only an outside gate and no receptionist or security staff to check badges on the way in.

This is an important point: providing this "choke point'' can serve the same purpose on your network as a guarded gate can for your site's physical premises. That means anytime you have a change in "zones'' or levels of sensitivity, such a checkpoint is appropriate. A company rarely has only an outside gate and no receptionist or security staff to check badges on the way in. If there are layers of security on your site, it's reasonable to expect layers of security on your network.

Now that you understand a little about what a firewall is, and what it can do, we'll take a look at what a firewall can't protect against, including their use against viruses. Stay tuned for Part 2

Copyright © 2026 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

profile

Chaturbate's Emely Zuniga Talks Show Floor Magic and Creator Care

During industry events, you’ll likely find Zuniga gliding through the room, greeting creators, checking details and making sure everyone around her feels taken care of. With her colorful red hair, perfectly done nails and an easygoing, “work bestie” demeanor that instantly puts people at ease, she thrives in the fast-paced environment of conferences and trade shows.

Jackie Backman ·
opinion

What to Know About Deepfakes, Likeness Rights, and Digital Consent

AI is reshaping virtually every sector of the global economy, and the adult industry is no exception. Many adult companies have already explored or adopted AI in content production, and surveys indicate that around 65% have considered implementing AI technologies in their operations.

Christoph Hermes ·
opinion

Key Strategies for Adapting to Stricter PCI Compliance Standards

When it comes to PCI compliance, the days of simply filling out some paperwork and answering a few questions are gone. A casual approach is just not viable anymore.

Jonathan Corona ·
opinion

How to Maximize Value From Your Payment Processing Fees

Regulatory requirements are putting more and more pressure on the adult industry. To stay compliant, merchants need tools that help with content moderation, age verification and fraud solutions. Unfortunately, the fees for those tools are hitting merchants’ bottom lines — including fees charged by payment services providers.

Cathy Beardsley ·
opinion

Understanding Sin Taxes and the Legal Roadblocks Ahead

As of this writing, a bill sits on the desk of Utah’s governor, awaiting his signature to make it state law. That bill includes a provision imposing an excise tax of 2% on adult sites operating in the state.

Corey D. Silverstein ·
profile

LoyalFans' Anastasia Pierce Bridges Creator Education, Empowerment and Ownership

Anastasia Pierce beams when she talks about her 26 years in the industry. Full of passionate energy, she clearly doesn’t just work in adult; she loves it.

Women In Adult ·
opinion

Growing Site Revenue Under Ever-Changing Compliance Rules

Over the past year, many merchants have reported earnings that were flat or even a bit down. This is due to three main factors: age verification regulations, click-to-cancel rules, and banks backing away from cross-sales due to regulatory requirements and the rollout of the Visa Acquiring Monitoring Program (VAMP).

Cathy Beardsley ·
opinion

AI Safeguards for Platform Compliance and Trust

If your platform hosts user-generated content (UGC), then you already know protecting your brand is not merely a matter of good design or strong community guidelines. It requires systems that can verify who your users are, filter what they upload and ensure your business stays on the right side of regulators, payment processors and public opinion.

Christoph Hermes ·
opinion

How to Eliminate User Redirects and Improve Checkout Retention

Running an adult site, you work hard to create traffic and make sure your funnel is optimal, with the end goal of getting users to make a purchase. Then, right at that critical moment, what do you do? You send them somewhere else. Not good.

Jonathan Corona ·
profile

Stripchat's Jessica on Building Creator Success, One Step at a Time

At most industry events, the spotlight naturally falls on the creators whose personalities light up screens and social feeds. Behind the booths, parties and perfectly timed photo ops, however, there is someone else shaping the experience.

Jackie Backman ·
Show More