SlideShare una empresa de Scribd logo
1 de 30
 Define what is firewall ?
 Need of firewall
 Types of firewall
› Hardware firewall
 Advantage and disadvantage
› Software firewall
 Advantage and disadvantage
 Types of firewall techniques
› Packet filter
 Drawback of packet filtering
› Application gateway
 advantage
› Circuit-level gateway
› Bastion host
 What a personal firewall can do
 What a personal firewall can not do
 Manufacturing companies
 Firewall is device that provides secure
connectivity between
networks(internal/external).
 A firewall may be a hardware, software of a
combination of both that is used to prevent
unauthorized program or internet users from
accessing a private network or a single
computer.
 All message entering or leaving the intranet
pass through the firewall, which examines
each message & blocks those that do not
meet the specified security criteria.
 To protect confidential
information from those
who do not explicitly need
to access it.
 To protect our network &
its resources from
malicious users &
accidents that originate
outside of our network.
 Hardware firewall
 Software firewall
 It is a physical device.
 It can be installed
between the modem and
computer.
 It can be incorporated
into a broadband router
being used to share the
internet connection.
 Protect an entire network.
 Usually more expensive, header to configure
 E.g.- Cisco pix, netscreen, watchfuard etc.
 Uses very little system resources.
 More secure
 Enhanced security control
 Dedicated hardware firewalls are typically more
reliable
 Easy to disable or remove
 Work independently of associated computer
system.
 Install process is more demanding both
physically and mentally.
 Takes up physical work space
 More expensive
 Harder to upgrade and repair
 It is a software
application.
 It is installed onto the
computer system that
you wish to protect .
 Protect a single computer
 This is usually the computer with modem
attached to it.
 Usually less expensive, easier to configure
 E.g.- Norton internet security, MacAfee
internet security etc.
 Considerably cheaper or even free.
 Simple to install and upgrade
 Requires no physical changes to hardware
or network
 Ideal for home/family use
 Takes up no physical space.
 Software may crash or be incompatible with
system
 Can be difficult to completely disable &
especially remove
 Software bugs may compromise security
 Can be resource hungry
 Incompatibilities with OS.
 Packet filter
 Application gateway/proxy server/proxy
application gateway
 Circuit-level gateway
 Bastion host
 It looks at each packet entering or leaving
the network accepts or rejects it based on
user-defined rules.
Applications
Presentations
Sessions
Transport
Data Link
Physical
Data Link
Physical
Router
Applications
Presentations
Sessions
Transport
Data Link
Physical
Network Network
 Packet filtering is fairly effective &
transparent to users, but it is difficult to
configure.
 In addition, it is susceptible to IP spoofing.
 Drawback of packet filtering technique:-
i. Packet filtering rules can be complex.
ii. Logging facility is not provided by such
firewall.
iii. If TCP/IP packet filtering is not implemented
fully, it can lead to security hole.
iv. Cannot handle RPC (remote produce calls)
 In such type of firewall remote host or
network can interact only with proxy server,
proxy server is responsible for hiding the
details of the internal network i.e. intranet.
 Users uses TCP/IP application, such as FTP
& Telnet servers.
Applications
Presentations
Sessions
Transport
Data Link
Physical
Network
Data Link
Physical
Applications
Presentations
Sessions
Transport
Data Link
Physical
Application Gateway
Applications
Presentations
Sessions
Transport
Network Network
Telnet HTTPFTP
 This is very effective, but can impose a
performance degradation.
 Advantages of application gateway:-
i. Less complex filter rules
ii. Cost effectiveness
iii. Robust authentication & logging facility
iv. Proxy authenticates only those services for
v. Which it is configured/installed.
 It is a stand alone application.
 It does not permit end-to-end TCP connection. it
sets up 2 TCP connection:-
• Between itself and a TCP user on an inner host.
• Between itself and a TCP user on an outer host.
 Bastion host is a special purpose computer
on a network specifically designed and
configured to withstand attacks.
 It generally hosts a single application,
provides platform for application gateway
and circuit-level gateway.
 It supports limited/specific applications to
reduce the threat to the computer.
 Include application-Telnet, SMTP, FTP
 Stop hackers from accessing your
computer.
 Protect your personal information.
 Blocks “pop up” ads and certain
cookies.
 Determines which programs can
access the internet.
 Block invalid packets.
 Cannot prevent e-mail
viruses
-only an antivirus product
with update definitions
can prevent e-mail viruses.
 After setting it initially,
you cannot forget about it
-The firewall will require
periodic updates to the rule sets and the software itself.
 Cisco system, Inc.
 Nortel networks corporation
 Juniper networks, Inc.
 MacAfee, Inc.
 3com corporation
 Citrix systems, Inc
Introduction of firewall slides

Más contenido relacionado

La actualidad más candente

Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purposeRohit Phulsunge
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer networkpoorvavyas4
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security DefinitionPatten John
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall BharathiKrishna6
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)Jainam Shah
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
 

La actualidad más candente (20)

Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Firewall
FirewallFirewall
Firewall
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Network Security
Network SecurityNetwork Security
Network Security
 

Similar a Introduction of firewall slides

Similar a Introduction of firewall slides (20)

INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
Firewall
FirewallFirewall
Firewall
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Day4
Day4Day4
Day4
 
Firewall
FirewallFirewall
Firewall
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 
Kerberos
KerberosKerberos
Kerberos
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
محمد
محمدمحمد
محمد
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate Environment
 
Network security
Network securityNetwork security
Network security
 
Unit II Chapter 6 firewalls.ppt
Unit II Chapter 6 firewalls.pptUnit II Chapter 6 firewalls.ppt
Unit II Chapter 6 firewalls.ppt
 

Más de rahul kundu

Material management
Material managementMaterial management
Material managementrahul kundu
 
Business function in organization
Business function in organizationBusiness function in organization
Business function in organizationrahul kundu
 
Document object model(dom)
Document object model(dom)Document object model(dom)
Document object model(dom)rahul kundu
 
Document object model(dom)
Document object model(dom)Document object model(dom)
Document object model(dom)rahul kundu
 
Type of internet connectivity
Type of internet connectivityType of internet connectivity
Type of internet connectivityrahul kundu
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...rahul kundu
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udprahul kundu
 
Electronic payment system(EPS)
Electronic payment system(EPS)Electronic payment system(EPS)
Electronic payment system(EPS)rahul kundu
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesrahul kundu
 
Electronic data-interchange slides
Electronic data-interchange slidesElectronic data-interchange slides
Electronic data-interchange slidesrahul kundu
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 

Más de rahul kundu (17)

Material management
Material managementMaterial management
Material management
 
Business function in organization
Business function in organizationBusiness function in organization
Business function in organization
 
Document object model(dom)
Document object model(dom)Document object model(dom)
Document object model(dom)
 
Document object model(dom)
Document object model(dom)Document object model(dom)
Document object model(dom)
 
Dhtml
DhtmlDhtml
Dhtml
 
Sgml
SgmlSgml
Sgml
 
Internet
InternetInternet
Internet
 
Type of internet connectivity
Type of internet connectivityType of internet connectivity
Type of internet connectivity
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
 
Electronic payment system(EPS)
Electronic payment system(EPS)Electronic payment system(EPS)
Electronic payment system(EPS)
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
 
Electronic data-interchange slides
Electronic data-interchange slidesElectronic data-interchange slides
Electronic data-interchange slides
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
Virus slides
Virus slidesVirus slides
Virus slides
 
Mpeg 7 slides
Mpeg 7 slides Mpeg 7 slides
Mpeg 7 slides
 

Último

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Último (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Introduction of firewall slides

  • 1.
  • 2.  Define what is firewall ?  Need of firewall  Types of firewall › Hardware firewall  Advantage and disadvantage › Software firewall  Advantage and disadvantage
  • 3.  Types of firewall techniques › Packet filter  Drawback of packet filtering › Application gateway  advantage › Circuit-level gateway › Bastion host  What a personal firewall can do  What a personal firewall can not do  Manufacturing companies
  • 4.  Firewall is device that provides secure connectivity between networks(internal/external).
  • 5.  A firewall may be a hardware, software of a combination of both that is used to prevent unauthorized program or internet users from accessing a private network or a single computer.  All message entering or leaving the intranet pass through the firewall, which examines each message & blocks those that do not meet the specified security criteria.
  • 6.  To protect confidential information from those who do not explicitly need to access it.  To protect our network & its resources from malicious users & accidents that originate outside of our network.
  • 7.  Hardware firewall  Software firewall
  • 8.  It is a physical device.  It can be installed between the modem and computer.  It can be incorporated into a broadband router being used to share the internet connection.
  • 9.  Protect an entire network.  Usually more expensive, header to configure  E.g.- Cisco pix, netscreen, watchfuard etc.
  • 10.  Uses very little system resources.  More secure  Enhanced security control  Dedicated hardware firewalls are typically more reliable  Easy to disable or remove  Work independently of associated computer system.
  • 11.  Install process is more demanding both physically and mentally.  Takes up physical work space  More expensive  Harder to upgrade and repair
  • 12.  It is a software application.  It is installed onto the computer system that you wish to protect .
  • 13.  Protect a single computer  This is usually the computer with modem attached to it.  Usually less expensive, easier to configure  E.g.- Norton internet security, MacAfee internet security etc.
  • 14.  Considerably cheaper or even free.  Simple to install and upgrade  Requires no physical changes to hardware or network  Ideal for home/family use  Takes up no physical space.
  • 15.  Software may crash or be incompatible with system  Can be difficult to completely disable & especially remove  Software bugs may compromise security  Can be resource hungry  Incompatibilities with OS.
  • 16.  Packet filter  Application gateway/proxy server/proxy application gateway  Circuit-level gateway  Bastion host
  • 17.  It looks at each packet entering or leaving the network accepts or rejects it based on user-defined rules. Applications Presentations Sessions Transport Data Link Physical Data Link Physical Router Applications Presentations Sessions Transport Data Link Physical Network Network
  • 18.  Packet filtering is fairly effective & transparent to users, but it is difficult to configure.  In addition, it is susceptible to IP spoofing.
  • 19.  Drawback of packet filtering technique:- i. Packet filtering rules can be complex. ii. Logging facility is not provided by such firewall. iii. If TCP/IP packet filtering is not implemented fully, it can lead to security hole. iv. Cannot handle RPC (remote produce calls)
  • 20.  In such type of firewall remote host or network can interact only with proxy server, proxy server is responsible for hiding the details of the internal network i.e. intranet.  Users uses TCP/IP application, such as FTP & Telnet servers.
  • 21. Applications Presentations Sessions Transport Data Link Physical Network Data Link Physical Applications Presentations Sessions Transport Data Link Physical Application Gateway Applications Presentations Sessions Transport Network Network Telnet HTTPFTP
  • 22.  This is very effective, but can impose a performance degradation.
  • 23.  Advantages of application gateway:- i. Less complex filter rules ii. Cost effectiveness iii. Robust authentication & logging facility iv. Proxy authenticates only those services for v. Which it is configured/installed.
  • 24.  It is a stand alone application.  It does not permit end-to-end TCP connection. it sets up 2 TCP connection:- • Between itself and a TCP user on an inner host. • Between itself and a TCP user on an outer host.
  • 25.  Bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks.
  • 26.  It generally hosts a single application, provides platform for application gateway and circuit-level gateway.  It supports limited/specific applications to reduce the threat to the computer.  Include application-Telnet, SMTP, FTP
  • 27.  Stop hackers from accessing your computer.  Protect your personal information.  Blocks “pop up” ads and certain cookies.  Determines which programs can access the internet.  Block invalid packets.
  • 28.  Cannot prevent e-mail viruses -only an antivirus product with update definitions can prevent e-mail viruses.  After setting it initially, you cannot forget about it -The firewall will require periodic updates to the rule sets and the software itself.
  • 29.  Cisco system, Inc.  Nortel networks corporation  Juniper networks, Inc.  MacAfee, Inc.  3com corporation  Citrix systems, Inc