Application firewall: Difference between revisions
Appearance
Content deleted Content added
No edit summary |
|||
Line 11: | Line 11: | ||
== Application Layer Firewall Vendors == |
== Application Layer Firewall Vendors == |
||
⚫ | |||
*[http://www.binarysec.com BinarySEC] |
*[http://www.binarysec.com BinarySEC] |
||
*[http://www.citrix.com Citrix] |
|||
*[http://www.denyall.com Deny All] |
*[http://www.denyall.com Deny All] |
||
⚫ | |||
*[http://www.f5.com F5] |
*[http://www.f5.com F5] |
||
*[http://www. |
*[http://www.imperva.com Imperva] |
||
*[http://www.securecomputing.com/sidewinder Secure Computing - Sidewinder] |
*[http://www.securecomputing.com/sidewinder Secure Computing - Sidewinder] |
||
*[[Kerio WinRoute Firewall]] |
*[[Kerio WinRoute Firewall]] |
Revision as of 07:31, 2 March 2007
'''''In computer networking, an application layer firewall' is a firewall operating at the application layer of a protocol stack. Generally it is a host using various forms of proxy servers to proxy traffic instead of routing it. As it works on the application layer, it may inspect the contents of the traffic, blocking what the firewall administrator views as inappropriate content, such as certain websites, viruses, attempts to exploit known logical flaws in client software, and so forth.
An application layer firewall does not route traffic on the network layer. All traffic stops at the firewall which may initiate its own connections if the traffic satisfies the rules. ''