SlideShare una empresa de Scribd logo
1 de 24
PRESENTATION
ON
FIREWALL
Submitted by:
Gaurav Rajput
15-CAB-17
Contents :
 Introduction.
 What is an attack
 Hardware Firewalls
 Software Firewalls
 Firewall rules
 Types of Firewall techniques
 What a personal firewall can do
 What a personal firewall cannot do
 Conclusion
Introduction
A firewall is a device (or software feature) designed to
control the flow of traffic into and out-of a network.
 It is used to prevent unauthorized programs or Internet
users from accessing a private network
It monitors and controls the incoming and outgoing
network traffic based on predetermined security
rules.
In general, firewalls are installed to prevent
attacks.
What is an Attack?
Attack covers many things:
1. Someone probing a network for computers.
2. Someone attempting to crash services on a
computer.
3. Someone attempting to crash a computer.
4. Someone attempting to gain access to a computer
to use resources or information.
Hardware Vs Software Firewalls
Hardware firewalls
o Implemented on router level.
o Protect an entire network.
o Usually more expensive, harder to implement.
Software firewalls
o Protects a single computer.
o Usually less expensive, easier to implement.
Hardware Firewalls
Hardware firewalls are used more in companies and large
corporations.
 These devices are usually placed between the router and
the Internet connection.
A hardware firewall uses packet filtering to examine the
header of a packet to determine its source and destination.
 This information is compared to a set of predefined or
user-created rules that determine whether the packet is to
be forwarded or dropped.
Software Firewalls
For individual home users, the most popular firewall choice
is a software firewall. Software firewalls are installed on
your computer (like any software).
We can customize it; allowing us some control over its
function and protection features.
It protect our computer from outside attempts to control or
gain access our computer.
It also provide protection against the most common Trojan
programs or e-mail worms.
Inspects each individual “packet” of data as it arrives
either side of firewall.
Determines if it should me pass through or blocked.
Types of firewall technique
1. Packet filtering firewall
2. Application proxy firewall
3. Stateful inspection firewall
4. Circuit – level gateway firewall
Packet filtering firewall
A packet filtering firewall applies a set of rules to each
incoming and outgoing IP packet and then forwards or
discards the packet.
Filtering rules are based on information contained in
network packet.
 Sources IP address
 Destination IP address
 Sources and destination transport level address
 IP protocol field
 Interface
Packet filtering firewall
Two default policies are there to take default action to
determine whether to forward or discard the packet.
 Some possible attacks on firewall :
 Default = discard
 Default = forward
 IP address spoofing
 Source routing attacks
 Tiny fragment attacks
Packet filtering firewall
Advantage :
Disadvantage :
 Cost
 Low resource usage
 Best suited for smaller network
 Can work only on the network layer
 Do not support complex rule based support
 Vulnerable to spoofing
Application Proxy Firewall
An application – level gateway, also called an application
proxy , acts as a rely of application – level traffic.
It don’t allow any packets to directly pass between an
application and the user.
User requests service from proxy.
Proxy validates requests as legal.
Then actions requests and returns result to user.
Can log / audit traffic at application level.
Application Proxy Firewall
Advantages :
Disadvantages :
 More secure than packet filter firewalls.
 Easy to log and audit incoming traffic.
 Additional processing overhead on each connections.
Stateful Inspection firewall
A stateful inspection packet firewall tightens up the rules
for TCP traffic by creating a directory of outbound TCP
connections.
There is an entry for each currently established
connections.
The packet filter now allow incoming traffic to high –
numbered ports only for those packets that fit the profile
of one of the entries in this directory.
A stateful packet inspection firewall reviews the same
packet information as a packet filtering firewall , but also
records information about TCP connections.
Stateful Inspection firewall
It records session information such as IP addresses and
port numbers, which implement a much tighter security
posture than a static packet filter firewall.
It examines both incoming and outgoing packets
Circuit – level gateway Firewall
 This can be a stand – alone system or it can be a specialized
functions performed by an application – level gateway for certain
applications.
 It does not permit an end – to – end TCP connection; rather , the
gateways sets two TCP connections.
 A typical use of the circuit – level gateways is a situation in which
the system administrator trusts the internal users.
 The gateways can be configured to support application – level or
proxy service on inbound connections and circuit- level functions
for outbound connections.
Circuit – level gateway Firewall
Advantage :
Disadvantage:
 Comparatively inexpensive and provide Anonymity to the
private network.
 Do not filter individual Packets.
What a personal Firewall can do
Stop hackers from accessing your computer.
Protect your personal information.
Blocks “pop up” ads and certain cookies.
Determine which program can access the internet.
Blocks invalid packets.
What a personal Firewall can not do
Cannot prevent e-mail viruses.
only an antivirus product with update
definitions can prevent e-mail viruses.
 After seeing it initially, you cannot forget about it.
The firewall will require periodic updates
to the set rules and the software itself.
Conclusion
It is clear that some form of security for private networks
connected to the internet is essential.
A firewall is an important and necessary part of that
security , but cannot be expected to perform all the
required security functions
THANK YOU
Firewall presentation

Más contenido relacionado

La actualidad más candente

Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
rahul kundu
 

La actualidad más candente (20)

Firewall
FirewallFirewall
Firewall
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network security
Network securityNetwork security
Network security
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Firewall
FirewallFirewall
Firewall
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Cia security model
Cia security modelCia security model
Cia security model
 
Dmz
Dmz Dmz
Dmz
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
Network security
Network securityNetwork security
Network security
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 

Similar a Firewall presentation

Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
mordannon
 

Similar a Firewall presentation (20)

Firewall
FirewallFirewall
Firewall
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
Net Defender
Net DefenderNet Defender
Net Defender
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptx
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
What are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdfWhat are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdf
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 

Último

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Firewall presentation

  • 2. Contents :  Introduction.  What is an attack  Hardware Firewalls  Software Firewalls  Firewall rules  Types of Firewall techniques  What a personal firewall can do  What a personal firewall cannot do  Conclusion
  • 3. Introduction A firewall is a device (or software feature) designed to control the flow of traffic into and out-of a network.  It is used to prevent unauthorized programs or Internet users from accessing a private network
  • 4. It monitors and controls the incoming and outgoing network traffic based on predetermined security rules. In general, firewalls are installed to prevent attacks.
  • 5. What is an Attack? Attack covers many things: 1. Someone probing a network for computers. 2. Someone attempting to crash services on a computer. 3. Someone attempting to crash a computer. 4. Someone attempting to gain access to a computer to use resources or information.
  • 6. Hardware Vs Software Firewalls Hardware firewalls o Implemented on router level. o Protect an entire network. o Usually more expensive, harder to implement. Software firewalls o Protects a single computer. o Usually less expensive, easier to implement.
  • 7. Hardware Firewalls Hardware firewalls are used more in companies and large corporations.  These devices are usually placed between the router and the Internet connection. A hardware firewall uses packet filtering to examine the header of a packet to determine its source and destination.  This information is compared to a set of predefined or user-created rules that determine whether the packet is to be forwarded or dropped.
  • 8. Software Firewalls For individual home users, the most popular firewall choice is a software firewall. Software firewalls are installed on your computer (like any software). We can customize it; allowing us some control over its function and protection features. It protect our computer from outside attempts to control or gain access our computer. It also provide protection against the most common Trojan programs or e-mail worms.
  • 9. Inspects each individual “packet” of data as it arrives either side of firewall. Determines if it should me pass through or blocked.
  • 10. Types of firewall technique 1. Packet filtering firewall 2. Application proxy firewall 3. Stateful inspection firewall 4. Circuit – level gateway firewall
  • 11. Packet filtering firewall A packet filtering firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet. Filtering rules are based on information contained in network packet.  Sources IP address  Destination IP address  Sources and destination transport level address  IP protocol field  Interface
  • 12. Packet filtering firewall Two default policies are there to take default action to determine whether to forward or discard the packet.  Some possible attacks on firewall :  Default = discard  Default = forward  IP address spoofing  Source routing attacks  Tiny fragment attacks
  • 13. Packet filtering firewall Advantage : Disadvantage :  Cost  Low resource usage  Best suited for smaller network  Can work only on the network layer  Do not support complex rule based support  Vulnerable to spoofing
  • 14. Application Proxy Firewall An application – level gateway, also called an application proxy , acts as a rely of application – level traffic. It don’t allow any packets to directly pass between an application and the user. User requests service from proxy. Proxy validates requests as legal. Then actions requests and returns result to user. Can log / audit traffic at application level.
  • 15. Application Proxy Firewall Advantages : Disadvantages :  More secure than packet filter firewalls.  Easy to log and audit incoming traffic.  Additional processing overhead on each connections.
  • 16. Stateful Inspection firewall A stateful inspection packet firewall tightens up the rules for TCP traffic by creating a directory of outbound TCP connections. There is an entry for each currently established connections. The packet filter now allow incoming traffic to high – numbered ports only for those packets that fit the profile of one of the entries in this directory. A stateful packet inspection firewall reviews the same packet information as a packet filtering firewall , but also records information about TCP connections.
  • 17. Stateful Inspection firewall It records session information such as IP addresses and port numbers, which implement a much tighter security posture than a static packet filter firewall. It examines both incoming and outgoing packets
  • 18. Circuit – level gateway Firewall  This can be a stand – alone system or it can be a specialized functions performed by an application – level gateway for certain applications.  It does not permit an end – to – end TCP connection; rather , the gateways sets two TCP connections.  A typical use of the circuit – level gateways is a situation in which the system administrator trusts the internal users.  The gateways can be configured to support application – level or proxy service on inbound connections and circuit- level functions for outbound connections.
  • 19. Circuit – level gateway Firewall Advantage : Disadvantage:  Comparatively inexpensive and provide Anonymity to the private network.  Do not filter individual Packets.
  • 20. What a personal Firewall can do Stop hackers from accessing your computer. Protect your personal information. Blocks “pop up” ads and certain cookies. Determine which program can access the internet. Blocks invalid packets.
  • 21. What a personal Firewall can not do Cannot prevent e-mail viruses. only an antivirus product with update definitions can prevent e-mail viruses.  After seeing it initially, you cannot forget about it. The firewall will require periodic updates to the set rules and the software itself.
  • 22. Conclusion It is clear that some form of security for private networks connected to the internet is essential. A firewall is an important and necessary part of that security , but cannot be expected to perform all the required security functions