SlideShare una empresa de Scribd logo
1 de 13
CONTENTS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUER NETWORKS ARE  TYPICALLY  A SHARED RESOURCES  USED BY MANY APPLICATIONS  FOR  MANY DIFFERENT  PURPOSES. SOMETIMES THE DATA TRANSMITTED BETWEEN APPLICATION  PROCESS  IS  CONFIDENTIAL, AND THE  APPLICATIONS  WOULD  PREFER THAT OTHERS NOT  BE ABLE  TO  READ IT .BUT  THE  PROBLEM ARISES WHEN  SOMEONE  ELSE  WANT  TO MANIPULATE  WITH  YOUR  DATA .TO  BUILD  A  SYSTEM  THAT  MINIMIZES  THE  RISK  OF  SECURITY,IS  A  DIFFICULT  TASK. HOWEVER  THERE  ARE  SOME  ALOGORITHMS  AND  PROTOCOLS  AVAILABLE. ONE  OF  THEM IS  “FIREWALL”. INTRODUCTION
KEY WORDS   DSL #  Digital Subscriber Line .  A  family  of standards  for  transmitting  data  over  twisted  pair telephone  lines at multi mega bit per  second  speeds.  FTP  #  File Transfer  Protocol .  The  standard  protocol  of  the  internet  - architecture  for transferring  files  between  hosts. HTTP  #  Hyper Text Transfer Protocol . An application level protocol  based on a request /reply  paradigm and used in WWW. ISDN #  Integrated Service Digital Network . A  digital  communication service  offered  by  telephone  carriers  and  standardized  by ITU-T . PROXY # an  agent sitting between  a  client  and  server that intercepts  messages  and  provides some  service . SMTP # Simple Mail  Transfer Protocol . The electronic  mail protocol of  the  internet . URL  #  Uniform Resource Locator. A  text  string used to identify  the location of  internet  resources.
What  is  firewall  ? A  firewall  is  a  specially  programmed  router  that  sits between  a  site  and  the  rest  of  the  network .  It  is  used  to  enforce security  policy . In simple words,  firewall  is  a  barrier  to  keep destructive forces away  from your  property .
2.why we need FIREWWALL  ? ,[object Object],[object Object],[object Object],[object Object]
Why  not  other  security mechanism  ? O f course,there are many  other mechanisms available  like  , cryptographic  algorithm , authentication protocols ,message  integrity  protocols, PGP,secure  shell,IP security(IPSEC)and  many more . When you tried to establish a  connection to a node using,say,IPSEC ,you would  have  to authenticate yourself as a valid  peer . There are  2 reasons  . Firstly , the  other security measures  described are not widely developed . Getting  security algorithms  and protocols  right  is very difficult task , and so FIREWALL have been devised as  a stop gap measure while we wait  for IPSEC . Secondly , it allows  the system  administrator to implement a  security policy in one centralized place .
HOW  FIREWALL  WORK  ?
WHAT  IT DOES  ? IF  you  know a  good bit about how  data  moves in  internet , and  you can  see easily  how a firewall helps protect computers  inside a large company . Let’s say  that  you work at  a company  with  500 employees . The company will therefore have hundreds of  computers that all  have  network cards connecting  them together . In addition , the  company will  have one or more connections to the internet  through something like t1 or t3  lines . Without  a firewall  in place, all  of those hundreds of computers are directly accessible to anyone on the internet . A person who knows what he or she is doing can probe those computers ,try  to make FTP connections to them , try to make TELNET connections to  them and so on. If one employee  makes  a  mistake and  leaves a  security  hole, hackers  can get  to the machine and exploit the  hole.  With a firewall in place, the  landscape is much different . A company will  place a firewall at every connection to the internet . The  firewall  can implement  security  rules.  A company can  set rules like this for FTP servers,web servers, telnet servers and  so on . In addition ,the company can can  control how  employees connect  to web sites,whether  files are allowed to leave the company over the network and so on . A FIREWALL gives  company  tremendous  control  over how people use the network.
Types  of  firewalls ? Firewalls  use one  or more of three  methods to control traffic flowing in and out of the network .  1 #  FILTER  BASED FIREWALL 2#  PROXY  BASED  FIREWALL 3#  STATEFUL  INSPECTION  Filter based firewalls are configured with  a  table of addresses  that  characterize  the packets they will , and will not, forward . By  addresses, we mean more than  just the destination’s IP address,although this in one possibility.  Ex : (*,*,128.7.6.5,80) Generally. Each entry in the table is a 4tuple : it gives  the IP address and TCP port number for both source and destination . It sometimes called as  LEVEL 4 SWITCHES. To understand proxy based firewalls works and why you would want one - consider a corporate web server,where the  company wants to make some the  servers page accessible  to all external users ,but it  wants  to  restrict  certain of the pages  to corporate users  at one or more remote sites .  Continues……...
The solution is to put an HTTP  proxy on the  firewall . Remote  users  establish  an  HTTP/TCP  connection  to  the  proxy ,  which  looks  at  the URL contained  in the request  message . If  the  requested  page  is  allowed  for  source  host,the proxy establishes a  second HTTP/TCP  connection  to the server  and forwards  the request  on  to the  server. The proxy  then forwards  the  response  in the  reverse direction  between  the two TCP  connection. A  newer  method  that  doesn’t examine  the  contents of  each packet but  instead compares  certain key parts of  the packet  to a  database of trusted  information. Information  traveling  from  inside the firewall to the  outside is  monitored  for specific defining characteristics . If  the comparison  yields a reasonable match, the  information  is allowed  through . Otherwise  it  is  discarded .
What  it  protects  you  from  ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
We  conclude this  discussion  by observing that while a traditional  firewall  protects internal users  from  external users, it does nothing  to protect  or isolate internal  users  from  each other.  LIMITATIONS
The level of security you establish will  determine  how  many of  these  threats  can be  stopped  by  your firewall . The  highest level  of  security would  be  simply block everything  . Obviously that defeats the  purpose  of having  an  internet connection . But  a  common rule  of  thumb  is to block everything,then  begin to  select what  types  of  traffic you  will allow . One of  the best things about a firewall  from a security standpoint  is that it stops  anyone on the outside from logging onto a computer  in  your private network . While  this  is a big  deal  for businesses. In general,it  is  impossible for existing firewalls  to know who  is  accessing  the work and, therefore ,who has the  ability to  connect to  other machines on the network  .  Ultimately , security mechanisms like IPSEC are probably required to support such a level of security .  Still ,putting a  firewall  in place provides some “ peace  of  mind “.  conclusion

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Firewall
FirewallFirewall
Firewall
 
Network security
Network securityNetwork security
Network security
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Network security
Network security Network security
Network security
 
FireWall
FireWallFireWall
FireWall
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network security
Network securityNetwork security
Network security
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Firewall
FirewallFirewall
Firewall
 

Destacado

session7 Firewalls and VPN
session7 Firewalls and VPNsession7 Firewalls and VPN
session7 Firewalls and VPNMustafa Jarrar
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsAnthony Daniel
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Destacado (6)

session7 Firewalls and VPN
session7 Firewalls and VPNsession7 Firewalls and VPN
session7 Firewalls and VPN
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similar a Firewall (20)

Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Network Security
Network SecurityNetwork Security
Network Security
 
Lesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxLesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptx
 

Más de nayakslideshare (20)

Mips 64
Mips 64Mips 64
Mips 64
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Spyware
SpywareSpyware
Spyware
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Gis
GisGis
Gis
 
Lcd
LcdLcd
Lcd
 
Hyper Threading Technology
Hyper Threading TechnologyHyper Threading Technology
Hyper Threading Technology
 
Intro To Hacking
Intro To HackingIntro To Hacking
Intro To Hacking
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
 
Biochip 1
Biochip 1Biochip 1
Biochip 1
 
Biochip
BiochipBiochip
Biochip
 
Satellite Networks
Satellite NetworksSatellite Networks
Satellite Networks
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Biochip 1
Biochip 1Biochip 1
Biochip 1
 
Touch Screens
Touch ScreensTouch Screens
Touch Screens
 
Linux Security
Linux SecurityLinux Security
Linux Security
 
Dna Fingerprinting
Dna FingerprintingDna Fingerprinting
Dna Fingerprinting
 
Thinking Critically About WWW
Thinking Critically About WWWThinking Critically About WWW
Thinking Critically About WWW
 
Remote Sensing
Remote SensingRemote Sensing
Remote Sensing
 

Último

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Firewall

  • 1.
  • 2. COMPUER NETWORKS ARE TYPICALLY A SHARED RESOURCES USED BY MANY APPLICATIONS FOR MANY DIFFERENT PURPOSES. SOMETIMES THE DATA TRANSMITTED BETWEEN APPLICATION PROCESS IS CONFIDENTIAL, AND THE APPLICATIONS WOULD PREFER THAT OTHERS NOT BE ABLE TO READ IT .BUT THE PROBLEM ARISES WHEN SOMEONE ELSE WANT TO MANIPULATE WITH YOUR DATA .TO BUILD A SYSTEM THAT MINIMIZES THE RISK OF SECURITY,IS A DIFFICULT TASK. HOWEVER THERE ARE SOME ALOGORITHMS AND PROTOCOLS AVAILABLE. ONE OF THEM IS “FIREWALL”. INTRODUCTION
  • 3. KEY WORDS DSL # Digital Subscriber Line . A family of standards for transmitting data over twisted pair telephone lines at multi mega bit per second speeds. FTP # File Transfer Protocol . The standard protocol of the internet - architecture for transferring files between hosts. HTTP # Hyper Text Transfer Protocol . An application level protocol based on a request /reply paradigm and used in WWW. ISDN # Integrated Service Digital Network . A digital communication service offered by telephone carriers and standardized by ITU-T . PROXY # an agent sitting between a client and server that intercepts messages and provides some service . SMTP # Simple Mail Transfer Protocol . The electronic mail protocol of the internet . URL # Uniform Resource Locator. A text string used to identify the location of internet resources.
  • 4. What is firewall ? A firewall is a specially programmed router that sits between a site and the rest of the network . It is used to enforce security policy . In simple words, firewall is a barrier to keep destructive forces away from your property .
  • 5.
  • 6. Why not other security mechanism ? O f course,there are many other mechanisms available like , cryptographic algorithm , authentication protocols ,message integrity protocols, PGP,secure shell,IP security(IPSEC)and many more . When you tried to establish a connection to a node using,say,IPSEC ,you would have to authenticate yourself as a valid peer . There are 2 reasons . Firstly , the other security measures described are not widely developed . Getting security algorithms and protocols right is very difficult task , and so FIREWALL have been devised as a stop gap measure while we wait for IPSEC . Secondly , it allows the system administrator to implement a security policy in one centralized place .
  • 7. HOW FIREWALL WORK ?
  • 8. WHAT IT DOES ? IF you know a good bit about how data moves in internet , and you can see easily how a firewall helps protect computers inside a large company . Let’s say that you work at a company with 500 employees . The company will therefore have hundreds of computers that all have network cards connecting them together . In addition , the company will have one or more connections to the internet through something like t1 or t3 lines . Without a firewall in place, all of those hundreds of computers are directly accessible to anyone on the internet . A person who knows what he or she is doing can probe those computers ,try to make FTP connections to them , try to make TELNET connections to them and so on. If one employee makes a mistake and leaves a security hole, hackers can get to the machine and exploit the hole. With a firewall in place, the landscape is much different . A company will place a firewall at every connection to the internet . The firewall can implement security rules. A company can set rules like this for FTP servers,web servers, telnet servers and so on . In addition ,the company can can control how employees connect to web sites,whether files are allowed to leave the company over the network and so on . A FIREWALL gives company tremendous control over how people use the network.
  • 9. Types of firewalls ? Firewalls use one or more of three methods to control traffic flowing in and out of the network . 1 # FILTER BASED FIREWALL 2# PROXY BASED FIREWALL 3# STATEFUL INSPECTION Filter based firewalls are configured with a table of addresses that characterize the packets they will , and will not, forward . By addresses, we mean more than just the destination’s IP address,although this in one possibility. Ex : (*,*,128.7.6.5,80) Generally. Each entry in the table is a 4tuple : it gives the IP address and TCP port number for both source and destination . It sometimes called as LEVEL 4 SWITCHES. To understand proxy based firewalls works and why you would want one - consider a corporate web server,where the company wants to make some the servers page accessible to all external users ,but it wants to restrict certain of the pages to corporate users at one or more remote sites . Continues……...
  • 10. The solution is to put an HTTP proxy on the firewall . Remote users establish an HTTP/TCP connection to the proxy , which looks at the URL contained in the request message . If the requested page is allowed for source host,the proxy establishes a second HTTP/TCP connection to the server and forwards the request on to the server. The proxy then forwards the response in the reverse direction between the two TCP connection. A newer method that doesn’t examine the contents of each packet but instead compares certain key parts of the packet to a database of trusted information. Information traveling from inside the firewall to the outside is monitored for specific defining characteristics . If the comparison yields a reasonable match, the information is allowed through . Otherwise it is discarded .
  • 11.
  • 12. We conclude this discussion by observing that while a traditional firewall protects internal users from external users, it does nothing to protect or isolate internal users from each other. LIMITATIONS
  • 13. The level of security you establish will determine how many of these threats can be stopped by your firewall . The highest level of security would be simply block everything . Obviously that defeats the purpose of having an internet connection . But a common rule of thumb is to block everything,then begin to select what types of traffic you will allow . One of the best things about a firewall from a security standpoint is that it stops anyone on the outside from logging onto a computer in your private network . While this is a big deal for businesses. In general,it is impossible for existing firewalls to know who is accessing the work and, therefore ,who has the ability to connect to other machines on the network . Ultimately , security mechanisms like IPSEC are probably required to support such a level of security . Still ,putting a firewall in place provides some “ peace of mind “. conclusion