The pros and cons of Windows Firewall

dipdude

Skilled
Is Windows Firewall up to the task of securing your network? We delve into the details of this host-based stateful firewall and weigh its pros and cons.

Windows Firewall debuted with the release of Windows XP, and Windows XP Service Pack 2 enabled this feature by default. This host-based stateful firewall replaced Windows' Internet Connection Firewall.

This feature's default configuration rejects incoming IP traffic unless you've specifically allowed it. To configure or adjust the Windows Firewall settings, go to Start | Control Panel, and double-click the Windows Firewall applet. Let's take a closer look at the various settings.



Know your options


On the General tab, you can use the On and Off radio buttons to enable or disable Windows Firewall. You can also choose to disallow exceptions.

The Exceptions tab includes a list of programs and services that you can select or deselect to allow or remove access to the network. You can also add or delete ports (both TCP and UDP).

When adding programs or ports, you also have the following options to limit the scope of access: Any Computer (Including Those On The Internet), My Network (Subnet) Only, or Custom List, which allows you to choose a mix of IP addresses and subnets.

On the Advanced tab, you can choose which connections the firewall will apply to, and you can specify logging features. You can also control, with some granularity, how the firewall handles Internet Control Message Protocol (ICMP) packets.

Finally, if you get completely lost and make changes that prevent the computer from connecting to the Internet, you can click the Restore Defaults button. This removes all of your changes, returning Windows Firewall to the Microsoft default state.



Know how to adjust the settings


You can use the method described above to manually change the Windows Firewall settings. However, you can also use a variety of methods more suited for enterprise deployments. Here are some of your options:

  • Unattend.txt: You can use this text file used during unattended setup when deploying multiple systems that have similar configurations.
  • Netfw.ini: You can modify and deploy this file via login scripts or a control system such as Systems Management Server (SMS). You can find this file in the %windir%\Inf folder.
  • Netsh: You can execute this command at the command prompt or through a scripted batch file deployed at login.
  • Group Policy: In an Active Directory environment you can use Group Policy to deploy Windows Firewall configurations. Update existing Group Policy Objects with the Windows Firewall policy settings from the updated System.adm template included with Windows XP SP2. You can find these new settings under Computer Configuration | Administrative Templates | Network | Network Connections.

Of course, all of these available configuration and deployment options beg the question: Does this firewall adequately protect your computer?

The Windows Firewall does a good job of proxying inbound responses to outbound connection requests, and it does a good job of blocking inbound connection requests for TCP or UDP conversations that you haven't initiated. It will block any connection attempts that you haven't specifically allowed in the settings. However, that's only half of what a firewall needs to do.

A firewall should also monitor, inspect, and proxy outbound communication—and this is where Windows Firewall fails. Any program on your computer can initiate any type of connection to any IP address on the Internet, and the Windows Firewall will sit by passively and let it happen!

Don't let any prompts fool you: Even though it tells you a program has initiated a connection to the Internet and asks if you want to allow this connection, the connection has already occurred. What it's really asking is whether you want to allow the Internet to connect to this program.


Final thoughts

As far as I'm concerned, a firewall mechanism that only works one way is a security feature -- not a firewall. Thanks to viruses, worms, Trojans, and a host of other malware and spyware that arrive on your computer daily, you need to be able to control communications from both directions.

Every computer connected to any network (e.g., dial-up, Ethernet, or wireless) needs a firewall, and Windows Firewall just isn't up to the task. Find yourself a free firewall or pay for one from a reputable vendor, but don't let Windows Firewall fool you into thinking it completely protects your computer. Half a firewall is no better than no firewall at all.

Source : TechRepublic
 
me just downloaded outpost firewall pro .. will use it for sometime .. i was worried about the xp sp2 firewall though i was using it for a long time now.

ZA was good but it had issues with kaspersky ... so no decent option left other than Outpost.

SP2 firewall is decent but i am paranoid as i do online transactions and stuff from my pc.
 
Zone alarm is by far the crappiest firewall ever...even after i gave full permissions to counterstrike ( which i play online) ...it always made my game hang up...
 
I used ZA without any anti virus on win xp + sp2 for a year no major issues.... I'll rate it the best firwall :D once i gave permission to all the programs i use online it worked like a charm :)
Now got Avast AV running with Zone Alarm... best freware protection....
 
while playing....games..if u keep zone alarm ...in game mode...there are no hang ups in game...

been using zone alarm since last 1 yr...and had no probs..wid it..IMO its the best !
 
Well i guess this post was meant to discuss about windows firewall,sorry guys all of your posts are off topic.

Here are my list of pros and cons of Windows firewall.

Pros:

a)Enabled by default,so that end users who are less aware of the security are protected by default.

b)Stateful inspection:Also refered to as dynamic filtering .Stateful inspection is the firewall architecture that works at network layer.Unlike static packet filtering, which examies packet based on its header.Stateful inspection tracks each connection traversing all interfaces of the firewall and make sure that they are valid. An example of stateful firwall,may examine not just the header information but also content of the packet up through the application layer layer in order to determine more about the packet than just information about its source and destination.

c)Less strain on memory and network.

d)Customisable rule.

e)Easy to use.

Cons:

a)No Protection against Spyware and Malware(no integration with internet explorer).

b)No protection against Application outbound connection.

c)No protection against protocol anomaly(A deviation from the standard protocol. An intrusion detection system (IDS) may look for protocol anomalies in order to identify attacks without a signature. Protocol anomalies reduce false positives with well-understood protocols, but may cause false positives with poorly understood or complex protocols)
 
the only advantage i find abt windows firewall is ....
I myself use the free version of ZoneAlarm Firewall+Nod32 Antivirus
No problems whatsoever....Will be getting a legit version of ZA combo pack soon...
 
Back
Top