SlideShare a Scribd company logo
1 of 27
Outline
 Introduction
 Firewall design principles
 Firewall characteristics
 What firewalls do?
 What firewalls cannot do?
 Types of firewalls
 references
Firewall
Introduction
• A firewall : Acts as a security gateway between two networks-Usually
between trusted and untrusted networks (such as between a corporate
network and the Internet)
• Tracks and controls network communications Decides whether to pass,
reject, encrypt, or log communications (Access Control)
• Is hardware, software, or a combination of both.
• used to prevent unauthorized programs or Internet users from accessing a
private network and/or a single computer.
• A firewall sits at the junction point or gateway between
the two networks, usually a private network and a public network such as
the Internet.
INTERNET
Firewall
Secure
Private
Network
My
PC
Rules Determine
Hardware vs. Software Firewalls
• Hardware Firewalls
• Protect an entire network
• Implemented on the router level
• Usually more expensive, harder to configure
• Software Firewalls
• Protect a single computer
• Usually less expensive, easier to configure
Firewall Design
Principles
• The firewall is inserted between the premises network and
the Internet
• Aims:
• Establish a controlled link
• Protect the premises network from Internet-based attacks
• Provide a single choke point
Firewall Characteristics
• Design goals:
• All traffic from inside to outside must pass through the firewall .
• Only authorized traffic (defined by the local security police) will
be allowed to pass
• The firewall itself is immune to penetration (use of trusted system
with a secure operating system)
Firewall Characteristics
• Four general techniques:
1. Service control
• Determines the types of Internet services that can be accessed, inbound or
outbound
2. Direction control
• Determines the direction in which particular service requests are allowed to flow
3. User control
• Controls access to a service according to which user is attempting to access it
4. Behavior control
• Controls how particular services are used (e.g. filter e-mail)
What Firewalls Do
• Positive Effects
• Negative Effects
Positive Effects
• User authentication.
Firewalls can be configured to require user authentication. This
allows network administrators to control ,track specific user activity.
• Auditing and logging.
By configuring a firewall to log and audit activity, information may be
kept and analyzed at a later date.
• Anti-Spoofing - Detecting when the source of the network traffic is being
"spoofed", i.e., when an individual attempting to access a blocked service alters
the source address in the message so that the traffic is allowed.
• Network Address Translation (NAT) - Changing the network addresses of devices
on any side of the firewall to hide their true addresses from devices on other
sides. There are two ways NAT is performed:
• One-to-One - where each true address is translated to a unique translated
address.
• Many-to-One - where all true addresses are translated to a single address,
usually that of the firewall.
• Negative Effects
Although firewall solutions provide many benefits, negative effects may also be
experienced.
• Traffic bottlenecks. By forcing all network traffic to pass through the firewall,
there is a greater chance that the network will become congested.
• Single point of failure. In most configurations where firewalls are the only link
between networks, if they are not configured correctly or are unavailable, no
traffic will be allowed through.
• Increased management responsibilities. A firewall often adds to network
management responsibilities and makes network troubleshooting more
complex.
What Firewalls Cannot Do
• Do Firewalls Prevent Viruses and Trojans? NO!! A firewall
can only prevent a virus or Trojan from accessing the internet
while on your machine
• 95% of all viruses and Trojans are received via e-mail, through
file sharing or through direct download of a malicious program
• Firewalls can't prevent this -- only a good anti-virus software
program can however , once installed on your PC, many viruses and
Trojans "call home" using the internet to the hacker that designed it
• This lets the hacker activate the Trojan and he/she can now use your PC
for his/her own purposes
• A firewall can block the call home and can alert you if there is suspicious
behavior taking place on your system
Types of Firewalls
• Three common types of Firewalls:
• Packet-filtering routers
• Circuit-level gateways
• Application-level gateways
• Basic TCP/IP Flow review
Packet Filtering Firewall
• Applies a set of rules to each incoming IP packet and then forwards
or discards the packet
• Filter packets going in both directions
• The packet filter is typically set up as a list of rules based on
matches to fields in the IP or TCP header
• Two default policies (discard or forward)
• A packet filtering firewall is often called a network layer firewall
because the filtering is primarily done at the network layer (layer
three) or the transport layer (layer four) of the OSI reference model.
Packet filtering rules or filters can be configured to allow or deny traffic based on
one or more of the following variables:
• Source IP address
• Destination IP address
• Protocol type (TCP/UDP)
• Source port
• Destination port
advantages:
• Packet filtering is typically faster than other packet screening methods.
Because packet filtering is done at the lower levels of the OSI model, the
time it takes to process a packet is much quicker.
• Packet filtering firewalls can be implemented transparently. They typically
require no additional configuration for clients.
• Packet filtering firewalls are typically less expensive. Many hardware
devices and software packages have packet filtering features included as
part of their standard package.
• Disadvantages:
• Difficulty of setting up packet filter rules
• Lack of Authentication
Circuit-level Gateway
• Unlike a packet filtering firewall, a circuit-level gateway does not examine
individual packets. Instead, circuit-level gateways monitor TCP or UDP
sessions.
• The main difference between packet filtering and this is that it validates
TCP and UDP sessions before opening a connection through the firewall.
Once a session has been established, it leaves the port open to allow all
other packets belonging to that session to pass. The port is closed when
the session is terminated.
circuit-level gateways operate at the transport layer (layer 4) and session
layer of the OSI model.
• The firewall maintains a virtual circuit table, which stores the
connection details of the successful connections.
Advantages-
• More secure than packet filter firewalls.
• Faster than application level firewalls.
Disadvantages-
• Only detect one transport layer protocol-TCP.
• Cannot perform security checks on higher level protocols.
Application-level Gateway
• Also called proxy server
• Gateway sits between user on inside and server on outside. Instead of talking
directly, user and server talk through proxy.
• This type of firewall operates at the application level of the OSI model. For source
and destination endpoints to be able to communicate with each other, a proxy
service must be implemented for each application protocol.
Advantages-
• Allow the network administrator to have more control over traffic passing
through the firewall. They can permit or deny specific applications or
specific features of an application.
• Higher security than packet filters
Disadvantages-
Additional processing overhead on
each connection (gateway as splice
point)
1. Not all services have proxied versions.
2. May need different proxy server for
each service.
References-
• Behrouz A. Forouzan, “Cryptography and Network Security”, McGraw-
Hill publication.
• William Stallings , “Cryptography and Network Security: Principles and
Standards”, Prentice Hall India.
Thank you

More Related Content

What's hot

Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesAkshay Kurhade
 
VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )Kashyap Mandaliya
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)Jainam Shah
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7limsh
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterMaksudujjaman
 
Windows firewall
Windows firewallWindows firewall
Windows firewallVC Infotech
 
FireWall
FireWallFireWall
FireWallrubal_9
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurationsStudent
 
Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...usman butt
 
Network security Lab manual
Network security Lab manual Network security Lab manual
Network security Lab manual Vivek Kumar Sinha
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 

What's hot (20)

Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) services
 
VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Veracode - Overview
Veracode - OverviewVeracode - Overview
Veracode - Overview
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 
FireWall
FireWallFireWall
FireWall
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Firewall
FirewallFirewall
Firewall
 
Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...
 
Network security Lab manual
Network security Lab manual Network security Lab manual
Network security Lab manual
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 

Similar to Firewall Design and Implementation

Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewallsDivya Jyoti
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Radhika Talaviya
 
BAIT1103 Chapter 8
BAIT1103 Chapter 8BAIT1103 Chapter 8
BAIT1103 Chapter 8limsh
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Prabhdeep Kaur
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation9921103075
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ finalpg13tarun_g
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architectureMuhammad ismail Shah
 
Unit 5.3_Firewalls (1).ppt
Unit 5.3_Firewalls (1).pptUnit 5.3_Firewalls (1).ppt
Unit 5.3_Firewalls (1).pptAnuReddy68
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.pptKaushal72
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)Zara Nawaz
 

Similar to Firewall Design and Implementation (20)

Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Seminar
SeminarSeminar
Seminar
 
Firewall
FirewallFirewall
Firewall
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
 
BAIT1103 Chapter 8
BAIT1103 Chapter 8BAIT1103 Chapter 8
BAIT1103 Chapter 8
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
 
Firewall
FirewallFirewall
Firewall
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
 
Network security
 Network security Network security
Network security
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
Unit 5.3_Firewalls (1).ppt
Unit 5.3_Firewalls (1).pptUnit 5.3_Firewalls (1).ppt
Unit 5.3_Firewalls (1).ppt
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
 
Firewall
FirewallFirewall
Firewall
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

Firewall Design and Implementation

  • 1. Outline  Introduction  Firewall design principles  Firewall characteristics  What firewalls do?  What firewalls cannot do?  Types of firewalls  references
  • 3. Introduction • A firewall : Acts as a security gateway between two networks-Usually between trusted and untrusted networks (such as between a corporate network and the Internet) • Tracks and controls network communications Decides whether to pass, reject, encrypt, or log communications (Access Control) • Is hardware, software, or a combination of both. • used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. • A firewall sits at the junction point or gateway between the two networks, usually a private network and a public network such as the Internet.
  • 5. Hardware vs. Software Firewalls • Hardware Firewalls • Protect an entire network • Implemented on the router level • Usually more expensive, harder to configure • Software Firewalls • Protect a single computer • Usually less expensive, easier to configure
  • 6. Firewall Design Principles • The firewall is inserted between the premises network and the Internet • Aims: • Establish a controlled link • Protect the premises network from Internet-based attacks • Provide a single choke point
  • 7. Firewall Characteristics • Design goals: • All traffic from inside to outside must pass through the firewall . • Only authorized traffic (defined by the local security police) will be allowed to pass • The firewall itself is immune to penetration (use of trusted system with a secure operating system)
  • 8. Firewall Characteristics • Four general techniques: 1. Service control • Determines the types of Internet services that can be accessed, inbound or outbound 2. Direction control • Determines the direction in which particular service requests are allowed to flow 3. User control • Controls access to a service according to which user is attempting to access it 4. Behavior control • Controls how particular services are used (e.g. filter e-mail)
  • 9. What Firewalls Do • Positive Effects • Negative Effects
  • 10. Positive Effects • User authentication. Firewalls can be configured to require user authentication. This allows network administrators to control ,track specific user activity. • Auditing and logging. By configuring a firewall to log and audit activity, information may be kept and analyzed at a later date.
  • 11. • Anti-Spoofing - Detecting when the source of the network traffic is being "spoofed", i.e., when an individual attempting to access a blocked service alters the source address in the message so that the traffic is allowed. • Network Address Translation (NAT) - Changing the network addresses of devices on any side of the firewall to hide their true addresses from devices on other sides. There are two ways NAT is performed: • One-to-One - where each true address is translated to a unique translated address. • Many-to-One - where all true addresses are translated to a single address, usually that of the firewall.
  • 12. • Negative Effects Although firewall solutions provide many benefits, negative effects may also be experienced. • Traffic bottlenecks. By forcing all network traffic to pass through the firewall, there is a greater chance that the network will become congested. • Single point of failure. In most configurations where firewalls are the only link between networks, if they are not configured correctly or are unavailable, no traffic will be allowed through. • Increased management responsibilities. A firewall often adds to network management responsibilities and makes network troubleshooting more complex.
  • 13. What Firewalls Cannot Do • Do Firewalls Prevent Viruses and Trojans? NO!! A firewall can only prevent a virus or Trojan from accessing the internet while on your machine • 95% of all viruses and Trojans are received via e-mail, through file sharing or through direct download of a malicious program • Firewalls can't prevent this -- only a good anti-virus software program can however , once installed on your PC, many viruses and Trojans "call home" using the internet to the hacker that designed it • This lets the hacker activate the Trojan and he/she can now use your PC for his/her own purposes • A firewall can block the call home and can alert you if there is suspicious behavior taking place on your system
  • 14. Types of Firewalls • Three common types of Firewalls: • Packet-filtering routers • Circuit-level gateways • Application-level gateways • Basic TCP/IP Flow review
  • 15. Packet Filtering Firewall • Applies a set of rules to each incoming IP packet and then forwards or discards the packet • Filter packets going in both directions • The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header • Two default policies (discard or forward)
  • 16.
  • 17. • A packet filtering firewall is often called a network layer firewall because the filtering is primarily done at the network layer (layer three) or the transport layer (layer four) of the OSI reference model.
  • 18. Packet filtering rules or filters can be configured to allow or deny traffic based on one or more of the following variables: • Source IP address • Destination IP address • Protocol type (TCP/UDP) • Source port • Destination port
  • 19. advantages: • Packet filtering is typically faster than other packet screening methods. Because packet filtering is done at the lower levels of the OSI model, the time it takes to process a packet is much quicker. • Packet filtering firewalls can be implemented transparently. They typically require no additional configuration for clients. • Packet filtering firewalls are typically less expensive. Many hardware devices and software packages have packet filtering features included as part of their standard package. • Disadvantages: • Difficulty of setting up packet filter rules • Lack of Authentication
  • 20. Circuit-level Gateway • Unlike a packet filtering firewall, a circuit-level gateway does not examine individual packets. Instead, circuit-level gateways monitor TCP or UDP sessions. • The main difference between packet filtering and this is that it validates TCP and UDP sessions before opening a connection through the firewall. Once a session has been established, it leaves the port open to allow all other packets belonging to that session to pass. The port is closed when the session is terminated. circuit-level gateways operate at the transport layer (layer 4) and session layer of the OSI model.
  • 21.
  • 22. • The firewall maintains a virtual circuit table, which stores the connection details of the successful connections. Advantages- • More secure than packet filter firewalls. • Faster than application level firewalls. Disadvantages- • Only detect one transport layer protocol-TCP. • Cannot perform security checks on higher level protocols.
  • 23. Application-level Gateway • Also called proxy server • Gateway sits between user on inside and server on outside. Instead of talking directly, user and server talk through proxy. • This type of firewall operates at the application level of the OSI model. For source and destination endpoints to be able to communicate with each other, a proxy service must be implemented for each application protocol.
  • 24. Advantages- • Allow the network administrator to have more control over traffic passing through the firewall. They can permit or deny specific applications or specific features of an application. • Higher security than packet filters
  • 25. Disadvantages- Additional processing overhead on each connection (gateway as splice point) 1. Not all services have proxied versions. 2. May need different proxy server for each service.
  • 26. References- • Behrouz A. Forouzan, “Cryptography and Network Security”, McGraw- Hill publication. • William Stallings , “Cryptography and Network Security: Principles and Standards”, Prentice Hall India.