Jump to content

Application firewall: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
Ssehic (talk | contribs)
Line 11: Line 11:


== Application Layer Firewall Vendors ==
== Application Layer Firewall Vendors ==
*[http://www.armorlogic.com Armorlogic]
*[http://www.binarysec.com BinarySEC]
*[http://www.binarysec.com BinarySEC]
*[http://www.citrix.com Citrix]
*[http://www.denyall.com Deny All]
*[http://www.denyall.com Deny All]
*[http://www.imperva.com Imperva]
*[http://www.f5.com F5]
*[http://www.f5.com F5]
*[http://www.citrix.com Citrix]
*[http://www.imperva.com Imperva]
*[http://www.securecomputing.com/sidewinder Secure Computing - Sidewinder]
*[http://www.securecomputing.com/sidewinder Secure Computing - Sidewinder]
*[[Kerio WinRoute Firewall]]
*[[Kerio WinRoute Firewall]]

Revision as of 07:31, 2 March 2007

'''''In computer networking, an application layer firewall' is a firewall operating at the application layer of a protocol stack. Generally it is a host using various forms of proxy servers to proxy traffic instead of routing it. As it works on the application layer, it may inspect the contents of the traffic, blocking what the firewall administrator views as inappropriate content, such as certain websites, viruses, attempts to exploit known logical flaws in client software, and so forth.

An application layer firewall does not route traffic on the network layer. All traffic stops at the firewall which may initiate its own connections if the traffic satisfies the rules. ''

See also

Useful links

Application Layer Firewall Vendors