I am Smit Panchal from Mumbai made a ppt on Firewall and its techniques
A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet
2. Introduction
A firewall is a protective layer for your server that
monitors and filters incoming and outgoing network traffic.
It uses a set of rules to determine to allow or block specific
network traffic.
Firewalls can prevent unauthorized use before reaching
your servers.
Firewalls can be hardware or software based.
3. Why need of Firewalls
To protect confidential information from those who do not explicitly need to
access it.
To protect our network & its resources from malicious users & accidents that
originate outside of our network.
A firewall keeps destructive and disruptive forces out, and controls the
incoming and outgoing network traffic based on security parameters that you
can control and refine.
4. Types Of Firewalls
A. Hardware Firewall
It is a physical device. More secure
It can be installed between the modem and computer.
It can be incorporated into a broadband router being used to share the
internet connection.
E.g.- Cisco pix, netscreen, watchfuard etc.
5. B. Software Firewall
It is a software application
It is installed onto the computer system that you wish to protect
Protect a single computer
This is usually the computer with modem attached to it.
E.g.- Norton internet security, MacAfee internet security etc.
Simple to install and upgrade
Takes up no physical space
6. Access Control List
(ACL)
An access control list (ACL) contains rules that grant or deny access to certain
digital environments. There are two types of ACLs:
Filesystem ACLs━filter access to files and/or directories. Filesystem
ACLs tell operating systems which users can access the system, and what
privileges the users are allowed.
Networking ACLs━filter access to the network. Networking ACLs tell
routers and switches which type of traffic can access the network, and which
activity is allowed.
ACLs were the only way to achieve firewall protection
ACL Types – Standard and Extended ACL.
7. Packet Filtering
Packet filtering is a firewall technique used to control network access by
monitoring outgoing and incoming packets and allowing them to pass or halt
based on the source and destination Internet Protocol (IP) addresses,
protocols and ports
Packet filtering is fairly effective & transparent to users, but it is difficult to
configure.
Packet-filtering firewalls operate at the network layer (Layer 3) of the OSI
model. Packet-filtering firewalls make processing decisions based on network
addresses, ports, or protocols.
Packet filtering checks source and destination IP addresses. If both IP
addresses match, the packet is considered secure and verified
8. DEMILITARIZED ZONE
(DMZ)
A DMZ, short for demilitarized zone, also sometimes known as a perimeter
network or a screened subnetwork is a network (physical or logical) used to
connect hosts that provide an interface to an untrusted external network –
usually the internet – while keeping the internal, private network – usually
the corporate network – separated and isolated form the external network.
The DMZ is isolated using a security gateway (i.e. firewall) to filter traffic
between the DMZ and the private network.
The ultimate goal of a DMZ is to allow access to resources from untrusted
networks while keeping the private network secured.
9. Alerts and Audit Trials
A firewall alert pop-up appears on your computer screen when
the firewall detects suspicious network traffic on your computer.
Firewall Analyzer lets you to administer the triggered alerts, so that the
network administrators take care of the triggered alerts and carry out
remediation if required.
Audit trails are the manual or electronic records that chronologically catalog
events or procedures to provide support documentation and history that is
used to authenticate security and operational actions, or mitigate challenges
Audit trails can also identify areas of non-compliance by providing
information for audit investigations.
Audit trail records will contain details that include date, time, and user
information associated with the transaction