Keeping Bad Traffic Out
Using pre-established criteria, firewalls examine incoming and outgoing data to assess the legitimacy of the traffic. Different kinds of data access specific locations on your network known as ports. The port used for VoIP phone communication, for instance, is often open. Only traffic from the VoIP provider may enter this port, and all other traffic may be blocked by a rule put in your firewall.