SlideShare una empresa de Scribd logo
1 de 16
Shashwat Shriparv
dwivedishashwat@gmail.com
InfinitySoft
Shashwat Shriparv
dwivedishashwat@gmail.com
InfinitySoft
Shashwat Shriparv
dwivedishashwat@gmail.com
InfinitySoft
Firewalls
 What is a Firewall
 Types of Firewalls
 Network Layer
 Application Layer
 Network Address Translations
 Appropriate use of Firewalls
 Configuration considerations
What is a Firewall
 A firewall's basic task is to transfer traffic between computer networks
of different trust levels.Typical examples are the Internet which is a
zone with no trust and an internal network which is a zone of higher
trust. A zone with an intermediate trust level, situated between the
Internet and a trusted internal network, is often referred to as a
"perimeter network" or Demilitarized zone (DMZ).
 A firewall's function within a network is similar to firewalls in
building construction, because in both cases they are intended to
isolate one "network" or "compartment" from another. However,
network firewalls, unlike physical firewalls, are designed to allow some
traffic to flow.
What is a Firewall
 Without proper configuration, a firewall can often become
worthless. Standard security practices dictate a "default-deny"
firewall ruleset, in which the only network connections which are
allowed are the ones that have been explicitly allowed.
Unfortunately, such a configuration requires detailed
understanding of the network applications and endpoints
required for the organization's day-to-day operation. Many
businesses lack such understanding, and therefore implement a
"default-allow" ruleset, in which all traffic is allowed unless it has
been specifically blocked. This configuration makes inadvertent
network connections and system compromise much more likely.
What is a Firewall
Types of Firewalls
Types of Firewalls
 Network layer firewalls, also called packet filters, operate at a relatively
low level of theTCP/IP protocol stack
 They will not allow packets to pass through the firewall unless they
match the established ruleset.The firewall administrator may define
the rules; or default rules may apply.
 Network layer firewalls generally fall into two sub-categories, stateful and
stateless.
 Stateful firewalls maintain context about active sessions, and use that "state
information" to speed up packet processing. Any existing network
connection can be described by several properties, including source and
destination IP address, UDP orTCP ports, and the current stage of the
connection's lifetime (including session initiation, handshaking, data
transfer, or completion connection. If a packet does not match an existing
connection, it will be evaluated according to the ruleset for new connections.
If a packet matches an existing connection based on comparison with the
firewall's state table, it will be allowed to pass without further processing.
Types of Firewalls
 Application-layer firewalls work on the application level of theTCP/IP
stack (i.e., all browser traffic, or all telnet or ftp traffic), and may intercept
all packets traveling to or from an application.They block other packets
(usually dropping them without acknowledgement to the sender). In
principle, application firewalls can prevent all unwanted outside traffic from
reaching protected machines.
 By inspecting all packets for improper content, firewalls can restrict or
prevent outright the spread of networked computer worms and trojans. In
practice, however, this becomes so complex and so difficult to attempt (given
the variety of applications and the diversity of content each may allow in its
packet traffic) that comprehensive firewall design does not generally attempt
this approach
Types of Firewalls
Network AddressTranslation (NAT, also known as Network
Masquerading, Native AddressTranslation or IP Masquerading)
involves re-writing the source and/or destination addresses of IP
packets as they pass through a Router or firewall. Most systems using
NAT do so in order to enable multiple hosts on a private network to
access the Internet using a single public IP address. Many network
administrators find NAT a convenient technique and use it widely.
Nonetheless, NAT can introduce complications in communication
between hosts and may have a performance impact
Types of Firewalls
 Network AddressTranslation
 One-to-One (One private address for One public address)
 Geared for applications that require use of many ports/apps (i.e. ftp, www,
8081).
 Port AddressTranslation
 One-to-many (One public IP address is used, but specific ports are translated).
 Geared for applications that only need 1 port in connection (i.e. basic web
servers, e-mail).
Types of Firewalls
Appropriate use of Firewalls
 Firewalls are applicable when –
 When there is two networks that have a distinct trust factor (friend/foe).
 When network topology is designed to flow all traffic thru a single
interface which connects to the firewall (i.e. protected networks
connection must terminate behind firewall).
 When there is need for extra layer of protection for certain applications.
 Firewalls are NOT applicable when
 When applications that transverse two networks are QoS sensitive.
 Vendors use scare tactics and not give a qualified reason for firewall.
 When you are only support and haven’t been trained.
 When application/resource accessibility is more critical than security
(timing).
Appropriate use of Firewalls
Configuration Considerations
 By default, less trusted networks has NO access to the trusted network
(deny all).
 Be port specific as possible when allowing outside host to access
applications.
 Remember ANY means ANY in a firewall ruleset! Outside of web
and e-mail, this should not be used to allow access into applications.
 For vendor support, restrict access just to their network or IP Address.
 Certain applications are very firewall sensitive (i.e.Voice, H323 or any
QoS type apps).
 Firewalls does not encrypt data unless specifically programmed( IPSec
tunnel).
 Rulesets/access-list will not work unless applied to interface.
Configuration Considerations
Shashwat Shriparv
dwivedishashwat@gmail.com
InfinitySoft
Shashwat Shriparv
dwivedishashwat@gmail.com
InfinitySoft

Más contenido relacionado

La actualidad más candente

La actualidad más candente (19)

Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
session7 Firewalls and VPN
session7 Firewalls and VPNsession7 Firewalls and VPN
session7 Firewalls and VPN
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Firewalls in network
Firewalls in networkFirewalls in network
Firewalls in network
 
Firewall & its Services
Firewall & its ServicesFirewall & its Services
Firewall & its Services
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 

Similar a Firewalls (20)

FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Firewall
Firewall Firewall
Firewall
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Firewall
FirewallFirewall
Firewall
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
Note8
Note8Note8
Note8
 
Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptx
 
Firewall
FirewallFirewall
Firewall
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
The Complete Questionnaires About Firewall
The Complete Questionnaires About FirewallThe Complete Questionnaires About Firewall
The Complete Questionnaires About Firewall
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
PT.pptx
PT.pptxPT.pptx
PT.pptx
 
Firewalls-Intro
Firewalls-IntroFirewalls-Intro
Firewalls-Intro
 
Firewalls
FirewallsFirewalls
Firewalls
 

Más de Shashwat Shriparv (20)

Learning Linux Series Administrator Commands.pptx
Learning Linux Series Administrator Commands.pptxLearning Linux Series Administrator Commands.pptx
Learning Linux Series Administrator Commands.pptx
 
LibreOffice 7.3.pptx
LibreOffice 7.3.pptxLibreOffice 7.3.pptx
LibreOffice 7.3.pptx
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
 
Suspending a Process in Linux.pptx
Suspending a Process in Linux.pptxSuspending a Process in Linux.pptx
Suspending a Process in Linux.pptx
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
 
Command Seperators.pptx
Command Seperators.pptxCommand Seperators.pptx
Command Seperators.pptx
 
Upgrading hadoop
Upgrading hadoopUpgrading hadoop
Upgrading hadoop
 
Hadoop migration and upgradation
Hadoop migration and upgradationHadoop migration and upgradation
Hadoop migration and upgradation
 
R language introduction
R language introductionR language introduction
R language introduction
 
Hive query optimization infinity
Hive query optimization infinityHive query optimization infinity
Hive query optimization infinity
 
H base introduction & development
H base introduction & developmentH base introduction & development
H base introduction & development
 
Hbase interact with shell
Hbase interact with shellHbase interact with shell
Hbase interact with shell
 
H base development
H base developmentH base development
H base development
 
Hbase
HbaseHbase
Hbase
 
H base
H baseH base
H base
 
My sql
My sqlMy sql
My sql
 
Apache tomcat
Apache tomcatApache tomcat
Apache tomcat
 
Linux 4 you
Linux 4 youLinux 4 you
Linux 4 you
 
Introduction to apache hadoop
Introduction to apache hadoopIntroduction to apache hadoop
Introduction to apache hadoop
 
Next generation technology
Next generation technologyNext generation technology
Next generation technology
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Firewalls

  • 2. Firewalls  What is a Firewall  Types of Firewalls  Network Layer  Application Layer  Network Address Translations  Appropriate use of Firewalls  Configuration considerations
  • 3. What is a Firewall  A firewall's basic task is to transfer traffic between computer networks of different trust levels.Typical examples are the Internet which is a zone with no trust and an internal network which is a zone of higher trust. A zone with an intermediate trust level, situated between the Internet and a trusted internal network, is often referred to as a "perimeter network" or Demilitarized zone (DMZ).
  • 4.  A firewall's function within a network is similar to firewalls in building construction, because in both cases they are intended to isolate one "network" or "compartment" from another. However, network firewalls, unlike physical firewalls, are designed to allow some traffic to flow. What is a Firewall
  • 5.  Without proper configuration, a firewall can often become worthless. Standard security practices dictate a "default-deny" firewall ruleset, in which the only network connections which are allowed are the ones that have been explicitly allowed. Unfortunately, such a configuration requires detailed understanding of the network applications and endpoints required for the organization's day-to-day operation. Many businesses lack such understanding, and therefore implement a "default-allow" ruleset, in which all traffic is allowed unless it has been specifically blocked. This configuration makes inadvertent network connections and system compromise much more likely. What is a Firewall
  • 7. Types of Firewalls  Network layer firewalls, also called packet filters, operate at a relatively low level of theTCP/IP protocol stack  They will not allow packets to pass through the firewall unless they match the established ruleset.The firewall administrator may define the rules; or default rules may apply.
  • 8.  Network layer firewalls generally fall into two sub-categories, stateful and stateless.  Stateful firewalls maintain context about active sessions, and use that "state information" to speed up packet processing. Any existing network connection can be described by several properties, including source and destination IP address, UDP orTCP ports, and the current stage of the connection's lifetime (including session initiation, handshaking, data transfer, or completion connection. If a packet does not match an existing connection, it will be evaluated according to the ruleset for new connections. If a packet matches an existing connection based on comparison with the firewall's state table, it will be allowed to pass without further processing. Types of Firewalls
  • 9.  Application-layer firewalls work on the application level of theTCP/IP stack (i.e., all browser traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or from an application.They block other packets (usually dropping them without acknowledgement to the sender). In principle, application firewalls can prevent all unwanted outside traffic from reaching protected machines.  By inspecting all packets for improper content, firewalls can restrict or prevent outright the spread of networked computer worms and trojans. In practice, however, this becomes so complex and so difficult to attempt (given the variety of applications and the diversity of content each may allow in its packet traffic) that comprehensive firewall design does not generally attempt this approach Types of Firewalls
  • 10. Network AddressTranslation (NAT, also known as Network Masquerading, Native AddressTranslation or IP Masquerading) involves re-writing the source and/or destination addresses of IP packets as they pass through a Router or firewall. Most systems using NAT do so in order to enable multiple hosts on a private network to access the Internet using a single public IP address. Many network administrators find NAT a convenient technique and use it widely. Nonetheless, NAT can introduce complications in communication between hosts and may have a performance impact Types of Firewalls
  • 11.  Network AddressTranslation  One-to-One (One private address for One public address)  Geared for applications that require use of many ports/apps (i.e. ftp, www, 8081).  Port AddressTranslation  One-to-many (One public IP address is used, but specific ports are translated).  Geared for applications that only need 1 port in connection (i.e. basic web servers, e-mail). Types of Firewalls
  • 12. Appropriate use of Firewalls  Firewalls are applicable when –  When there is two networks that have a distinct trust factor (friend/foe).  When network topology is designed to flow all traffic thru a single interface which connects to the firewall (i.e. protected networks connection must terminate behind firewall).  When there is need for extra layer of protection for certain applications.
  • 13.  Firewalls are NOT applicable when  When applications that transverse two networks are QoS sensitive.  Vendors use scare tactics and not give a qualified reason for firewall.  When you are only support and haven’t been trained.  When application/resource accessibility is more critical than security (timing). Appropriate use of Firewalls
  • 14. Configuration Considerations  By default, less trusted networks has NO access to the trusted network (deny all).  Be port specific as possible when allowing outside host to access applications.  Remember ANY means ANY in a firewall ruleset! Outside of web and e-mail, this should not be used to allow access into applications.  For vendor support, restrict access just to their network or IP Address.  Certain applications are very firewall sensitive (i.e.Voice, H323 or any QoS type apps).
  • 15.  Firewalls does not encrypt data unless specifically programmed( IPSec tunnel).  Rulesets/access-list will not work unless applied to interface. Configuration Considerations