SlideShare una empresa de Scribd logo
1 de 32
Windows Firewall
Windows Firewall
Presented by :
Soban Ahmad
036
Waqar-ul-Malik
050
Our Discussing topics
 What is a firewall?
 Firewall types
 How a firewall works
 Default firewall behavior
 Windows 7 firewall features
 Configuring Windows 7 firewall
What is a firewall
 A firewall is software or hardware that helps prevent hackers
and some types of malware from getting to your PC through
a network or the Internet. It does this by checking the info
that’s coming from the Internet or a network and then either
blocking it or allowing it to pass through to your PC.
Firewall Types
Following are the types of Firewall Types
 Packet filtering
 stateful
 proxy
Packet filtering
makes each filtering decision on a packet by packet basis
without regard to previous packets in any directon
Stateful firewall
keeps track of packet flows and filters based on flow
information
Proxy firewall
works on a per-application basis. User sends to proxy,
proxy creates new packet sourced from proxy.
Firewall Types
 Network-based vs host-based
 Network-based runs a router, multi-layer switch or
dedicated firewall
 Host-based firewall runs on computer running OS
such as Windows 7 or UNIX
 Hardware vs software firewall
 Hardware firewall chassis designed for specifically to
operate as a firewall; highest performance
6
Windows Firewall
 Host-based, stateful software firewall
 Evaluates each packet as it arrives or leaves and determines
whether that packet is allowed or denied based on flow
 Windows 7 firewall is improved over XP version
Default Firewall Behavior
 Default is to allow all outbound traffic and
response inbound traffic; deny all other inbound
traffic
How Firewall Works
 Incoming packet is inspected and compared
against a list of allowed traffic.
 If packet matches a list entry, packet passed to
TCP/IP protocol for further processing.
 If the packet does not match a list entry then
packet is discarded
 If logging is enabled, Windows creates an entry in the
Firewall logging file
How List is Populated
 When enabled connection sends a packet, the
firewall creates an entry in the list for response
traffic.
 Allow rules can be manually created with
Advanced Security.
10
Windows 7 Firewall
 Windows Firewall features
 Inbound filtering
 Outbound filtering
 Firewall rules combined with IPsec rules
 Support for complex rules
 Support for logging
Locations and the Firewall
 Windows Firewall with Advanced Security
is a network location aware application
 Windows 7 stores the firewall properties
based on location types
 Configuration for each location type is
called a profile
 In each profile you can:
 Enable or disable Windows Firewall
 Configure inbound and/or outbound connections
 Customize logging and other settings
Locations and Firewall
Settings
 As the network location connected to changes,
the Windows Firewall profile changes.
 Windows Firewall can therefore automatically
allow incoming traffic for a specific desktop
management tool when the computer is on a
domain network but block similar traffic when the
computer is connected to public or private
networks.
Locations and Firewall
Settings
 Location types: domain, public, and private.
 Domain - the connection is authenticated to
a domain controller for the domain of which
it is a member.
 By default, all other networks are initially
classified as public networks.
 User can identify the network as either public
or private.
 Public profile: For use when in locations such as
airports or coffee shops.
 Private profile: For use when connected at a
home or office and behind an edge device.
 To classify a network as a private network, the
user must have administrator credentials.
Locations and Firewall
Settings
 While a computer may be connected to
multiple network locations at the same time,
only one profile can be active at a time. The
active profile is determined as follows:
 If all interfaces are authenticated to the
domain controller for the domain of which
the computer is a member, the domain
profile is applied.
 If at least one interface is connected to a
private network location and all other
interfaces are either authenticated to the
domain controller or are connected to
private network locations, the private profile
is applied.
 Otherwise, the public profile is applied.
Configuring Windows
Firewall
 Control Panel – Windows Firewall
16
Basic Firewall Configuration
17
Advanced Firewall Configuration
 Allows you to configure more complex rules, outgoing filtering,
and IPsec rules
18
Advanced Firewall Configuration
19
Windows Firewall Properties
20
IPSec Settings
 IPsec is a system for securing and authenticating IP-based
network connections
 IPsec defaults - you can configure
 Key exchange protocols
 Data protection protocols
 Authentication Method
21
Advanced Firewall Configuration
22
Advanced Firewall
Configuration
 View and Edit Firewall Rules
 A large number of inbound and outbound rules are created by
default in Windows Vista
23
Advanced Firewall Configuration
24
Advanced Firewall Configuration
 View and Edit Firewall Rules
 You modify an existing rule by opening its properties
 Tabs in the properties of an outbound rule
 General
 Programs and Services
 Computers
 Protocols and Ports
 Scope
 Advanced
 Create New Firewall Rules
 A wizard guides you through the process
25
Advanced Firewall Configuration
26
Advanced Firewall Configuration
 Create New Firewall Rules
 Rule types you can create with the Outbound Rule Wizard
 Program
 Port
 Predefined
 Custom
 Actions for a rule
 Allow the connection
 Allow the connection if it is secure
 Block the connection
27
Advanced Firewall Configuration
28
Advanced Firewall Configuration
 Create New Computer-Connection Security Rules
 Use IPsec to authenticate and secure communication between
two computers
 Security rule types
 Isolation
 Authentication exemption
 Server-to-server
 Tunnel
 Custom
29
Advanced Firewall Configuration
30
Advanced Firewall Configuration
 Monitor Windows Firewall Rules and Connections
 Firewall node allows you to see rules that are enabled in one
screen
 Connection Security node allows you to see the computer
connection security rules that are enabled and any security
associations that are active
 Security association
 Rules for communication between two computers
31
Advanced Firewall Configuration
Windows 7 firewall & its configuration

Más contenido relacionado

La actualidad más candente

Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer networkpoorvavyas4
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat ManagementLokesh Sharma
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkHASHIR RAZA
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security DefinitionPatten John
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purposeRohit Phulsunge
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefitsqaisar17
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructureAditya Nama
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)sonangrai
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsüremin_oz
 

La actualidad más candente (20)

Firewall
FirewallFirewall
Firewall
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
WPA-3: SEA and Dragonfly
WPA-3: SEA and DragonflyWPA-3: SEA and Dragonfly
WPA-3: SEA and Dragonfly
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Firewall
FirewallFirewall
Firewall
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Network devices
Network devicesNetwork devices
Network devices
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Wireshark
WiresharkWireshark
Wireshark
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Switches on Networking
Switches on NetworkingSwitches on Networking
Switches on Networking
 
Dmz
Dmz Dmz
Dmz
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 

Destacado

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture Yovan Chandel
 
Firewall
FirewallFirewall
FirewallApo
 
FireWall
FireWallFireWall
FireWallrubal_9
 
Human Error in Cyber Security
Human Error in Cyber SecurityHuman Error in Cyber Security
Human Error in Cyber SecurityAntti Ollila
 
Cisco pix firewall configuration for dcsl
Cisco pix firewall configuration for dcslCisco pix firewall configuration for dcsl
Cisco pix firewall configuration for dcslIT Tech
 
A walk through Windows firewall and Netsh commands
A walk through Windows firewall and Netsh commandsA walk through Windows firewall and Netsh commands
A walk through Windows firewall and Netsh commandsRhydham Joshi
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGene Carboni
 
Webinar Gratuito: "Analisis Forense al Firewall de Windows"
Webinar Gratuito: "Analisis Forense al Firewall de Windows"Webinar Gratuito: "Analisis Forense al Firewall de Windows"
Webinar Gratuito: "Analisis Forense al Firewall de Windows"Alonso Caballero
 
Procedures in Planning and Conducting Maintenance
Procedures in Planning and Conducting MaintenanceProcedures in Planning and Conducting Maintenance
Procedures in Planning and Conducting MaintenanceAlvin Gabejan
 
Windows Firewall & Its Configuration
Windows Firewall & Its ConfigurationWindows Firewall & Its Configuration
Windows Firewall & Its ConfigurationSoban Ahmad
 
The 20 Common ports
The 20 Common portsThe 20 Common ports
The 20 Common portsRKabbaniFTW
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
20 common port numbers and their purposes
20 common port numbers and their purposes 20 common port numbers and their purposes
20 common port numbers and their purposes salamassh
 

Destacado (20)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall
Firewall Firewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
FireWall
FireWallFireWall
FireWall
 
Human Error in Cyber Security
Human Error in Cyber SecurityHuman Error in Cyber Security
Human Error in Cyber Security
 
Port numbers
Port numbersPort numbers
Port numbers
 
Cisco pix firewall configuration for dcsl
Cisco pix firewall configuration for dcslCisco pix firewall configuration for dcsl
Cisco pix firewall configuration for dcsl
 
Common Ports
Common PortsCommon Ports
Common Ports
 
A walk through Windows firewall and Netsh commands
A walk through Windows firewall and Netsh commandsA walk through Windows firewall and Netsh commands
A walk through Windows firewall and Netsh commands
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System Utilities
 
Webinar Gratuito: "Analisis Forense al Firewall de Windows"
Webinar Gratuito: "Analisis Forense al Firewall de Windows"Webinar Gratuito: "Analisis Forense al Firewall de Windows"
Webinar Gratuito: "Analisis Forense al Firewall de Windows"
 
Procedures in Planning and Conducting Maintenance
Procedures in Planning and Conducting MaintenanceProcedures in Planning and Conducting Maintenance
Procedures in Planning and Conducting Maintenance
 
Windows Firewall & Its Configuration
Windows Firewall & Its ConfigurationWindows Firewall & Its Configuration
Windows Firewall & Its Configuration
 
Ch 22
Ch 22Ch 22
Ch 22
 
The 20 Common ports
The 20 Common portsThe 20 Common ports
The 20 Common ports
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
20 common port numbers and their purposes
20 common port numbers and their purposes 20 common port numbers and their purposes
20 common port numbers and their purposes
 

Similar a Windows 7 firewall & its configuration

Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix FirewallSouvik Santra
 
Ch10 Firewall it-slideshares.blogspot.com
Ch10 Firewall it-slideshares.blogspot.comCh10 Firewall it-slideshares.blogspot.com
Ch10 Firewall it-slideshares.blogspot.comphanleson
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewallMd Shihab
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinalmordannon
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Finalmordannon
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfatimagull32
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWallwebhostingguy
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWallwebhostingguy
 
Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptxskknowledge
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptgocokir267
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...FahmiOlayah
 
VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...
VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...
VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...VMworld
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALASaikiran Panjala
 

Similar a Windows 7 firewall & its configuration (20)

Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Ch10 Firewall it-slideshares.blogspot.com
Ch10 Firewall it-slideshares.blogspot.comCh10 Firewall it-slideshares.blogspot.com
Ch10 Firewall it-slideshares.blogspot.com
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Network security
Network securityNetwork security
Network security
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptx
 
Firewall
FirewallFirewall
Firewall
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
 
VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...
VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...
VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...
 
Firewall and vpn
Firewall and vpnFirewall and vpn
Firewall and vpn
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 

Más de Soban Ahmad

Online Loan Application & Its Verification System
Online Loan Application & Its Verification SystemOnline Loan Application & Its Verification System
Online Loan Application & Its Verification SystemSoban Ahmad
 
The Karnaugh Map
The Karnaugh MapThe Karnaugh Map
The Karnaugh MapSoban Ahmad
 
Online Loan Management System
Online Loan Management SystemOnline Loan Management System
Online Loan Management SystemSoban Ahmad
 
Advertisment Ethics
Advertisment EthicsAdvertisment Ethics
Advertisment EthicsSoban Ahmad
 
The 7 c,s of communication
The 7 c,s of communicationThe 7 c,s of communication
The 7 c,s of communicationSoban Ahmad
 
Water crisis in pakistan & its solutions
Water crisis in pakistan & its solutionsWater crisis in pakistan & its solutions
Water crisis in pakistan & its solutionsSoban Ahmad
 

Más de Soban Ahmad (7)

Online Loan Application & Its Verification System
Online Loan Application & Its Verification SystemOnline Loan Application & Its Verification System
Online Loan Application & Its Verification System
 
The Karnaugh Map
The Karnaugh MapThe Karnaugh Map
The Karnaugh Map
 
Online Loan Management System
Online Loan Management SystemOnline Loan Management System
Online Loan Management System
 
Advertisment Ethics
Advertisment EthicsAdvertisment Ethics
Advertisment Ethics
 
Report writing
Report writingReport writing
Report writing
 
The 7 c,s of communication
The 7 c,s of communicationThe 7 c,s of communication
The 7 c,s of communication
 
Water crisis in pakistan & its solutions
Water crisis in pakistan & its solutionsWater crisis in pakistan & its solutions
Water crisis in pakistan & its solutions
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Windows 7 firewall & its configuration

  • 1. Windows Firewall Windows Firewall Presented by : Soban Ahmad 036 Waqar-ul-Malik 050
  • 2. Our Discussing topics  What is a firewall?  Firewall types  How a firewall works  Default firewall behavior  Windows 7 firewall features  Configuring Windows 7 firewall
  • 3. What is a firewall  A firewall is software or hardware that helps prevent hackers and some types of malware from getting to your PC through a network or the Internet. It does this by checking the info that’s coming from the Internet or a network and then either blocking it or allowing it to pass through to your PC.
  • 4. Firewall Types Following are the types of Firewall Types  Packet filtering  stateful  proxy Packet filtering makes each filtering decision on a packet by packet basis without regard to previous packets in any directon Stateful firewall keeps track of packet flows and filters based on flow information Proxy firewall works on a per-application basis. User sends to proxy, proxy creates new packet sourced from proxy.
  • 5. Firewall Types  Network-based vs host-based  Network-based runs a router, multi-layer switch or dedicated firewall  Host-based firewall runs on computer running OS such as Windows 7 or UNIX  Hardware vs software firewall  Hardware firewall chassis designed for specifically to operate as a firewall; highest performance
  • 6. 6 Windows Firewall  Host-based, stateful software firewall  Evaluates each packet as it arrives or leaves and determines whether that packet is allowed or denied based on flow  Windows 7 firewall is improved over XP version
  • 7. Default Firewall Behavior  Default is to allow all outbound traffic and response inbound traffic; deny all other inbound traffic
  • 8. How Firewall Works  Incoming packet is inspected and compared against a list of allowed traffic.  If packet matches a list entry, packet passed to TCP/IP protocol for further processing.  If the packet does not match a list entry then packet is discarded  If logging is enabled, Windows creates an entry in the Firewall logging file
  • 9. How List is Populated  When enabled connection sends a packet, the firewall creates an entry in the list for response traffic.  Allow rules can be manually created with Advanced Security.
  • 10. 10 Windows 7 Firewall  Windows Firewall features  Inbound filtering  Outbound filtering  Firewall rules combined with IPsec rules  Support for complex rules  Support for logging
  • 11. Locations and the Firewall  Windows Firewall with Advanced Security is a network location aware application  Windows 7 stores the firewall properties based on location types  Configuration for each location type is called a profile  In each profile you can:  Enable or disable Windows Firewall  Configure inbound and/or outbound connections  Customize logging and other settings
  • 12. Locations and Firewall Settings  As the network location connected to changes, the Windows Firewall profile changes.  Windows Firewall can therefore automatically allow incoming traffic for a specific desktop management tool when the computer is on a domain network but block similar traffic when the computer is connected to public or private networks.
  • 13. Locations and Firewall Settings  Location types: domain, public, and private.  Domain - the connection is authenticated to a domain controller for the domain of which it is a member.  By default, all other networks are initially classified as public networks.  User can identify the network as either public or private.  Public profile: For use when in locations such as airports or coffee shops.  Private profile: For use when connected at a home or office and behind an edge device.  To classify a network as a private network, the user must have administrator credentials.
  • 14. Locations and Firewall Settings  While a computer may be connected to multiple network locations at the same time, only one profile can be active at a time. The active profile is determined as follows:  If all interfaces are authenticated to the domain controller for the domain of which the computer is a member, the domain profile is applied.  If at least one interface is connected to a private network location and all other interfaces are either authenticated to the domain controller or are connected to private network locations, the private profile is applied.  Otherwise, the public profile is applied.
  • 15. Configuring Windows Firewall  Control Panel – Windows Firewall
  • 17. 17 Advanced Firewall Configuration  Allows you to configure more complex rules, outgoing filtering, and IPsec rules
  • 20. 20 IPSec Settings  IPsec is a system for securing and authenticating IP-based network connections  IPsec defaults - you can configure  Key exchange protocols  Data protection protocols  Authentication Method
  • 22. 22 Advanced Firewall Configuration  View and Edit Firewall Rules  A large number of inbound and outbound rules are created by default in Windows Vista
  • 24. 24 Advanced Firewall Configuration  View and Edit Firewall Rules  You modify an existing rule by opening its properties  Tabs in the properties of an outbound rule  General  Programs and Services  Computers  Protocols and Ports  Scope  Advanced  Create New Firewall Rules  A wizard guides you through the process
  • 26. 26 Advanced Firewall Configuration  Create New Firewall Rules  Rule types you can create with the Outbound Rule Wizard  Program  Port  Predefined  Custom  Actions for a rule  Allow the connection  Allow the connection if it is secure  Block the connection
  • 28. 28 Advanced Firewall Configuration  Create New Computer-Connection Security Rules  Use IPsec to authenticate and secure communication between two computers  Security rule types  Isolation  Authentication exemption  Server-to-server  Tunnel  Custom
  • 30. 30 Advanced Firewall Configuration  Monitor Windows Firewall Rules and Connections  Firewall node allows you to see rules that are enabled in one screen  Connection Security node allows you to see the computer connection security rules that are enabled and any security associations that are active  Security association  Rules for communication between two computers