How does a firewall work exactly?

Firewall blocks a connection to a remote computer on a certain port(let's say that I'm trying to connect to that remote comp on port 545 or 1531 for example), but would firewall block connection if that remote comp is trying to connect on me (if I don't have a firewall) on port: 545 or 1531?

Can anyone explain or send me a link of some great firewall tutorials. First I would like to know basics about firewalls and then all complicated stuff and all of tiny details of their function. How to avoid firewalls?
vbr666Asked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

 
What90Commented:
I've always thought this was good:
http://computer.howstuffworks.com/firewall.htm
0
 
LRI41Commented:
 Firewall Tutorials

Internet Firewall Tutorial
A White Paper
July 2002
 
What a firewall does
http://www.rpanetwork.co.uk/wp/fw.rhtm


How to Configure Windows XP to Work with IRC
or
15 Easy Steps to a Fully Functional Firewall and IRC Client Under Windows XP

http://newircusers.com/xp.html




--------------------------------------------------------------------------------
 
July 2002• Vol.13 Issue 7  

Security
Understanding Firewall Alerts

http://www.smartcomputing.com/editorial/article.asp?guid=gxz5usb0&article=articles/2002/s1307/52s07web/52s07web.asp 


0

Experts Exchange Solution brought to you by ConnectWise

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
 
RLGSCCommented:
VBR666,

Firewalls look at messages going between one side and another. Messages are only allowed to pass through if they are deemed not a danger, and within policy. In all but the most trivial cases, the direction does count (a request inbound to say, the FTP port, is not the same as an outbound request to somebody else's FTP port).

The degree of checking varies depending upon the firewall (and the rules that are configured for it).

Depending upon the rules and the firewall, the checking can be quite extensive. In the simplest cases, the checking is done based upon the direction of the request, and the port number. More complex checking can include source and destination addresses, time of day, and examintation (And regulation) of the data stream itself.

The Computer Security Handbook (4th Edition) has a good chapter on firewalls (as well as many other good chapters on security issues).

- Bob (aka RLGSC)
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.