Firewalls analyze incoming traffic based on pre-established rules and filter traffic coming from unsecured or suspicious sources to prevent attacks. The fundamental functionality of our Firewall application is to block all incoming attacks from external sources on the internal network or LAN. Our Crystal Eye Firewall system is uniquely designed to work together with the Intrusion Protection System/Intrusion Detection System (IPS/IDS) to enhance the capabilities of the Firewall to deflect attacks and support the existing infrastructure.
Our Firewall System is made up of three applications, namely; Custom Firewall, DMZ Firewall and Egress Firewall.
- Custom Firewall: It provides elaborated configuration features that can be used to add custom firewall rules. Some of the basic rules are; inbound Rules, Outbound Rules, Connection Security Rules, and Monitoring Rules. The firewall rules added in Custom Firewall support all IPv4 traffic.
- The Demilitarized Zone (DMZ) Firewall: It provides an advanced security realm to a network zone that lies between the LAN and WAN. The DMZ is an isolated network laid between private networks and the internet. It plays a vital role in creating a buffer zone and buys more time for the incident response team in case of a breach.
- Egress Firewall: It enables the Firewall system to block or allow any outbound traffic originating from the internal network. The firewall can be configured to allow or block outbound traffic relating to a range of Services, Port or Port Range. The network traffic directed to a particular Domain can also be blocked by adding the hostname or IP address in Egress Firewall.