SlideShare una empresa de Scribd logo
1 de 38
 A firewall forms a barrier through which the traffic going in each direction
must pass. A firewall security policy dictates which traffic is authorized to
pass in each direction.
 Firewall is an effective means of protecting a local system or network of
systems from network based security threats while at the same time
affording access to outside world via WAN or Internet.
◦ All traffic from inside to outside and vice versa, must pass
through the firewall (physically blocking all access to the
local network except via the firewall).
◦ Only authorized traffic (defined by the local security policy)
will be allowed to pass.
 Service control
◦ Determines the types of Internet services that can be accessed,
inbound or outbound.
 Direction control
◦ Determines the direction in which particular service requests
are allowed to flow through the firewall.
 User control
◦ Controls access to a service according to which user is
attempting to access it.
 Behavior control
◦ Controls how particular services are used (e.g. filter e-mail).
 cannot protect against attacks bypassing it.
◦ eg sneaker net, utility modems.
 cannot protect against internal threats.
◦ eg disgruntled employee
 cannot protect against transfer of all virus
infected programs or files.
◦ because of huge range of O/S & file types
 What Is Firewall?
 Name The Techniques Involved In Firewall?
 Explain any two techniques?
 Any Two Limitations Of Firewall?
 Three common types of Firewalls:
◦ Packet-filtering routers
◦ Application-level gateways
◦ Circuit-level gateways
◦ Bastion host
◦ Applies a set of rules to each incoming IP packet
and then forwards or discards the packet.
◦ Filter packets going in both directions.
◦ The packet filter is typically set up as a list of rules
based on matches to fields in the IP or TCP header.
◦ Two default policies (discard or forward).
 Advantages:
◦ Simplicity
◦ Transparency to users
◦ High speed
 Disadvantages:
◦ Difficulty of setting up packet filter rules
◦ Lack of Authentication
 Possible attacks and appropriate countermeasures
◦ IP address spoofing
◦ Source routing attacks
◦ Tiny fragment attacks
 examine each IP packet in context
– keeps tracks of client-server sessions
– checks each packet validly belongs to one
 better able to detect bogus packets out of context
 Application-level Gateway
◦ Also called proxy server.
◦ Acts as a relay of application-level traffic.
 Advantages:
◦ Higher security than packet filters.
◦ Easy to log and audit all incoming traffic.
 Disadvantages:
◦ Additional processing overhead on each
connection (gateway as splice point).
 Circuit-level Gateway
◦ Stand-alone system or
◦ Specialized function performed by an The
gateway typically Application-level Gateway
◦ Sets up two TCP connections
◦ relays TCP segments from one connection to
the other without examining the contents
◦ A system identified by the firewall
administrator as a critical strong point in the
network´s security.
◦ The bastion host serves as a platform for an
application-level or circuit-level gateway.
What are the types of firewall?
 What is packet filter?
 Name the possible attacks involved in packet
filter?
 What is Application level gateway?
 what is circiut level gateway?
 Difference between application and circiut level
gateway?
 In addition to the use of simple configuration of a
single system (single packet filtering router or single
gateway), more complex configurations are possible.
 Screened host firewall system (single-homed bastion
host)
 Screened host firewall syste (dual-homed bastion host)
 Screened-subnet firewall system
Screened host firewall, single-homed bastion
configuration
 Firewall consists of two systems:
◦ A packet-filtering router.
◦ A bastion host.
 Configuration for the packet-filtering router:
◦ Only packets from and to the bastion host are
allowed to pass through the router.
 The bastion host performs authentication and proxy
functions.
Screened host firewall, dual-homed
bastion configuration
◦ The packet-filtering router is not completely
compromised.
◦ Traffic between the Internet and other hosts
on the private network has to flow through
the bastion host.
 Screened subnet firewall configuration
◦ Most secure configuration of the three.
◦ Two packet-filtering routers are used.
◦ Creation of an isolated sub-network.
 Advantages:
◦ Three levels of defense to thwart intruders.
◦ The outside router advertises only the existence
of the screened subnet to the Internet (internal
network is invisible to the Internet).
◦ The inside router advertises only the existence
of the screened sub-net to the internal network (
the systems on the inside cannot construct direct
routes to the internet.
• given system has identified a user
• determine what resources they can access
• general model is that of access matrix with
– subject - active entity (user, process)
– object - passive entity (file or resource)
– access right – way object can be accessed
• information security is increasingly important
• have varying degrees of sensitivity of information
– cf military info classifications: confidential, secret
etc
• subjects (people or programs) have varying
rights of access to objects (information)
• want to consider ways of increasing confidence
in systems to enforce these rights
• known as multilevel security
– subjects have maximum & current security level
– objects have a fixed security level classification
Firewall
Firewall

Más contenido relacionado

La actualidad más candente

Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesMdFazleRabbi18
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
Cryptography
CryptographyCryptography
CryptographyEmaSushan
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)shraddha_b
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal CryptosystemAdri Jovin
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentationKalluri Madhuri
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Dr. Kapil Gupta
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation harshit chavda
 
Keyloggers
KeyloggersKeyloggers
Keyloggerskdore
 

La actualidad más candente (20)

Data encryption
Data encryptionData encryption
Data encryption
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Key management
Key managementKey management
Key management
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Cryptography
CryptographyCryptography
Cryptography
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 

Destacado (18)

coloring method
 coloring method coloring method
coloring method
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloudcomputingit703 130915004442-phpapp01
Cloudcomputingit703 130915004442-phpapp01Cloudcomputingit703 130915004442-phpapp01
Cloudcomputingit703 130915004442-phpapp01
 
Slides cao
Slides caoSlides cao
Slides cao
 
C sharp notes
C sharp notesC sharp notes
C sharp notes
 
3 a. hil climbing
3 a. hil climbing3 a. hil climbing
3 a. hil climbing
 
Sp800 94.pdf
Sp800 94.pdfSp800 94.pdf
Sp800 94.pdf
 
Des1
Des1Des1
Des1
 
i_os_development_environment
i_os_development_environmenti_os_development_environment
i_os_development_environment
 
Alifeofinspiration nelsonmandela1918-2013-131205232125-phpapp02
Alifeofinspiration nelsonmandela1918-2013-131205232125-phpapp02Alifeofinspiration nelsonmandela1918-2013-131205232125-phpapp02
Alifeofinspiration nelsonmandela1918-2013-131205232125-phpapp02
 
Embedded
EmbeddedEmbedded
Embedded
 
Android ax app wcf
Android ax app wcfAndroid ax app wcf
Android ax app wcf
 
Classical cryptography1
Classical cryptography1Classical cryptography1
Classical cryptography1
 
Caqa5e ch1 with_review_and_examples
Caqa5e ch1 with_review_and_examplesCaqa5e ch1 with_review_and_examples
Caqa5e ch1 with_review_and_examples
 
Nelson Mandela
Nelson Mandela Nelson Mandela
Nelson Mandela
 
Advanced databases -client /server arch
Advanced databases -client /server archAdvanced databases -client /server arch
Advanced databases -client /server arch
 
Aes
AesAes
Aes
 
Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
 

Similar a Firewall

Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Radhika Talaviya
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)Jainam Shah
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewallsDivya Jyoti
 
BAIT1103 Chapter 8
BAIT1103 Chapter 8BAIT1103 Chapter 8
BAIT1103 Chapter 8limsh
 
A firewall is a network security device.
A firewall is a network security device.A firewall is a network security device.
A firewall is a network security device.abidhassan225
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
CSC437-Fall2013-Module-7-Firewalls-IDS.pdf
CSC437-Fall2013-Module-7-Firewalls-IDS.pdfCSC437-Fall2013-Module-7-Firewalls-IDS.pdf
CSC437-Fall2013-Module-7-Firewalls-IDS.pdfssuser1f1964
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)Zara Nawaz
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].pptBachaSirata
 

Similar a Firewall (20)

Firewalls
FirewallsFirewalls
Firewalls
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Firewall
FirewallFirewall
Firewall
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Firewall Modified
Firewall ModifiedFirewall Modified
Firewall Modified
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Firewall
FirewallFirewall
Firewall
 
BAIT1103 Chapter 8
BAIT1103 Chapter 8BAIT1103 Chapter 8
BAIT1103 Chapter 8
 
Seminar
SeminarSeminar
Seminar
 
A firewall is a network security device.
A firewall is a network security device.A firewall is a network security device.
A firewall is a network security device.
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
CSC437-Fall2013-Module-7-Firewalls-IDS.pdf
CSC437-Fall2013-Module-7-Firewalls-IDS.pdfCSC437-Fall2013-Module-7-Firewalls-IDS.pdf
CSC437-Fall2013-Module-7-Firewalls-IDS.pdf
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 

Último

Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋nirzagarg
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...SUHANI PANDEY
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 

Último (20)

Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 

Firewall

  • 1.
  • 2.  A firewall forms a barrier through which the traffic going in each direction must pass. A firewall security policy dictates which traffic is authorized to pass in each direction.  Firewall is an effective means of protecting a local system or network of systems from network based security threats while at the same time affording access to outside world via WAN or Internet.
  • 3. ◦ All traffic from inside to outside and vice versa, must pass through the firewall (physically blocking all access to the local network except via the firewall). ◦ Only authorized traffic (defined by the local security policy) will be allowed to pass.
  • 4.  Service control ◦ Determines the types of Internet services that can be accessed, inbound or outbound.  Direction control ◦ Determines the direction in which particular service requests are allowed to flow through the firewall.  User control ◦ Controls access to a service according to which user is attempting to access it.  Behavior control ◦ Controls how particular services are used (e.g. filter e-mail).
  • 5.  cannot protect against attacks bypassing it. ◦ eg sneaker net, utility modems.  cannot protect against internal threats. ◦ eg disgruntled employee  cannot protect against transfer of all virus infected programs or files. ◦ because of huge range of O/S & file types
  • 6.
  • 7.  What Is Firewall?  Name The Techniques Involved In Firewall?  Explain any two techniques?  Any Two Limitations Of Firewall?
  • 8.  Three common types of Firewalls: ◦ Packet-filtering routers ◦ Application-level gateways ◦ Circuit-level gateways ◦ Bastion host
  • 9.
  • 10. ◦ Applies a set of rules to each incoming IP packet and then forwards or discards the packet. ◦ Filter packets going in both directions. ◦ The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header. ◦ Two default policies (discard or forward).
  • 11.
  • 12.
  • 13.  Advantages: ◦ Simplicity ◦ Transparency to users ◦ High speed  Disadvantages: ◦ Difficulty of setting up packet filter rules ◦ Lack of Authentication
  • 14.  Possible attacks and appropriate countermeasures ◦ IP address spoofing ◦ Source routing attacks ◦ Tiny fragment attacks
  • 15.  examine each IP packet in context – keeps tracks of client-server sessions – checks each packet validly belongs to one  better able to detect bogus packets out of context
  • 16.
  • 17.
  • 18.  Application-level Gateway ◦ Also called proxy server. ◦ Acts as a relay of application-level traffic.  Advantages: ◦ Higher security than packet filters. ◦ Easy to log and audit all incoming traffic.  Disadvantages: ◦ Additional processing overhead on each connection (gateway as splice point).
  • 19.
  • 20.  Circuit-level Gateway ◦ Stand-alone system or ◦ Specialized function performed by an The gateway typically Application-level Gateway ◦ Sets up two TCP connections ◦ relays TCP segments from one connection to the other without examining the contents
  • 21.
  • 22. ◦ A system identified by the firewall administrator as a critical strong point in the network´s security. ◦ The bastion host serves as a platform for an application-level or circuit-level gateway.
  • 23. What are the types of firewall?
  • 24.  What is packet filter?  Name the possible attacks involved in packet filter?  What is Application level gateway?  what is circiut level gateway?  Difference between application and circiut level gateway?
  • 25.  In addition to the use of simple configuration of a single system (single packet filtering router or single gateway), more complex configurations are possible.
  • 26.  Screened host firewall system (single-homed bastion host)  Screened host firewall syste (dual-homed bastion host)  Screened-subnet firewall system
  • 27.
  • 28. Screened host firewall, single-homed bastion configuration  Firewall consists of two systems: ◦ A packet-filtering router. ◦ A bastion host.  Configuration for the packet-filtering router: ◦ Only packets from and to the bastion host are allowed to pass through the router.  The bastion host performs authentication and proxy functions.
  • 29.
  • 30. Screened host firewall, dual-homed bastion configuration ◦ The packet-filtering router is not completely compromised. ◦ Traffic between the Internet and other hosts on the private network has to flow through the bastion host.
  • 31.
  • 32.  Screened subnet firewall configuration ◦ Most secure configuration of the three. ◦ Two packet-filtering routers are used. ◦ Creation of an isolated sub-network.
  • 33.  Advantages: ◦ Three levels of defense to thwart intruders. ◦ The outside router advertises only the existence of the screened subnet to the Internet (internal network is invisible to the Internet). ◦ The inside router advertises only the existence of the screened sub-net to the internal network ( the systems on the inside cannot construct direct routes to the internet.
  • 34. • given system has identified a user • determine what resources they can access • general model is that of access matrix with – subject - active entity (user, process) – object - passive entity (file or resource) – access right – way object can be accessed
  • 35.
  • 36. • information security is increasingly important • have varying degrees of sensitivity of information – cf military info classifications: confidential, secret etc • subjects (people or programs) have varying rights of access to objects (information) • want to consider ways of increasing confidence in systems to enforce these rights • known as multilevel security – subjects have maximum & current security level – objects have a fixed security level classification