SlideShare una empresa de Scribd logo
1 de 10
ASSINGMENT




Topic:
Firewall
What is firewall?
A firewall can either be software-based or hardware-based and is used to help keep a
network secure. A system designed to prevent unauthorized access to or from a
private network. Firewalls can be implemented in both hardware and software, or a
combination of both. Firewalls are frequently used to prevent unauthorized Internet users
from accessing private networks connected to the Internet, especially intranets. It is a
set of related programs, located at a network gateway server, which protects the
resources of a private network from users from other networks.

Basically, a firewall, working closely with a router program, examines each
network packetto determine whether to forward it toward its destination. A firewall also
includes or works with a proxy server that makes network requests on behalf of
workstation users. A firewall is often installed in a specially designated computer separate
from the rest of the network so that no incoming request can get directly at private
network resources. A network's firewall builds a bridge between an internal network that
is assumed to be secure and trusted, and another network, usually an external
(inter)network, such as the Internet, that is not assumed to be secure and trusted.




Explain different type of firewall?
       Types of firewall:

       Network layer firewall
       Application layer firewall
       Circuit layer firewall
       Stateful multi-layer inspection firewall
Proxy firewall
      Host-based firewall
      Packet filtering
      Hybrid firewall



                            Network layer firewall
The first generation of firewalls (c. 1988) worked at the network level by
inspecting packet headers and filtering traffic based on the IP address of the
source and the destination, the port and the service. Some of these primeval
security applications could also filter packets based on protocols, the domain name
of the source and a few other attributes.

Network layer firewalls generally make their decisions based on the source
address, destination address and ports in individual IP packets. A simple router is
the traditional network layer firewall, since it is not able to make particularly
complicated decisions about what a packet is actually talking to or where it actually
came from. Modern network layer firewalls have become increasingly more
sophisticated, and now maintain internal information about the state of connections
passing through them at any time.

One important difference about many network layer firewalls is that they route
traffic directly through them, which means in order to use one, you either need to
have a validly-assigned IP address block or a private Internet address block.
Network layer firewalls tend to be very fast and almost transparent to their users.
Application layer firewall

Application-level firewalls (sometimes called proxies) have been looking more deeply into
the application data going through their filters. Application layer firewalls defined, are
hosts running proxy servers, which permit no traffic directly between networks, and they
perform elaborate logging and examination of traffic passing through them. By considering
the context of client requests and application responses, these firewalls attempt to
enforce correct application behavior; block malicious activity and help organizations ensure
the safety of sensitive information and systems. They can log user activity too.
Application-level filtering may include protection against spam and viruses as well, and be
able to block undesirable Web sites based on content rather than just their IP address.

If that sounds too good to be true, it is. The downside to deep packet inspection is that
the more closely a firewall examines network data flow, the longer it takes, and the
heavier hit your network performance will sustain. This is why the highest-end security
appliances include lots of RAM to speed packet processing. And of course you'll pay for
the added chips.

 Application layer firewalls defined, are hosts running proxy servers, which permit no
traffic directly between networks, and they perform elaborate logging and examination of
traffic passing through them. Since proxy applications are simply software running on the
firewall, it is a good place to do lots of logging and access control. Application layer
firewalls can be used as network address translators, since traffic goes in one side and out
the other, after having passed through an application that effectively masks the origin of
the initiating connection.

However, run-of-the-mill network firewalls can't properly defend applications. As Michael
Cobb explains, application-layer firewalls offer Layer 7 security on a more granular level,
and may even help organizations get more out of existing network devices.
Circuit layer firewall

These applications, which represent the second-generation of firewall technology, monitor
TCP handshaking between packets to make sure a session is legitimate. Traffic is filtered
based on specified session rules and may be restricted to recognized computers only.
Circuit-level firewalls hide the network itself from the outside, which is useful for denying
access to intruders. But they don't filter individual packets. Applies security mechanism
when a TCP or UDP connection is established. Once the connection has been made, packets
can flow between the hosts without further checking. Circuit gateways firewalls function
at the network transport layer. They allow or deny connections based on addresses and
prevent direct connection between networks.




                     Stateful multi-layer inspection firewall

Stateful multilayer inspection firewalls combine the aspects of the other three types of
firewalls. SML vendors claim that their products deploy the best features of the other
three firewall types. They filter packets at the network level and they recognize and
process application-level data, but since they don't employ proxies, they deliver reasonably
good performance in spite of the deep packet analysis. On the downside, they are not
cheap, and they can be difficult to configure and administer. They filter packets at the
network layer, determine whether session packets are legitimate and evaluate contents of
packets at the application layer. They allow direct connection between client and host,
alleviating the problem caused by the lack of transparency of application level gateways.
They rely on algorithms to recognize and process application layer data instead of running
application specific proxies. Stateful multilayer inspection firewalls offer a high level of
security, good performance and transparency to end users. They are expensive however,
and due to their complexity are potentially less secure than simpler types of firewalls if
not administered by highly competent personnel.




                             Proxy firewall

Proxy firewalls offer more security than other types of firewalls, but this is at the
expense of speed and functionality, as they can limit which applications your network can
support. Proxy firewalls also provide comprehensive, protocol-aware security analysis for
the protocols they support. This allows them to make better security decisions than
products that focus purely on packet header information. Intercepts all messages entering
and leaving the network. The proxy server efficiently hides the true network addresses.

                             Host-based firewall
Network perimeter firewalls cannot provide protection for traffic generated inside a
trusted network. For this reason, host-based firewalls running on individual computers are
needed. Host-based firewalls, of which Windows Firewall with Advanced Security is an
example, protect a host from unauthorized access and attack.

In addition to blocking unwanted incoming traffic, you can configure Windows Firewall with
Advanced Security to block specific types of outgoing traffic as well. Host-based firewalls
provide an extra layer of security in a network and function as integral components in a
complete defense strategy.

In Windows Firewall with Advanced Security, firewall filtering and IPsec are integrated.
This integration greatly reduces the possibility of conflict between firewall rules and
IPsec connection security settings.

                             Packet filtering

Firewalls fall into four broad categories: packet filters, circuit level gateways, application
level gateways and stateful multilayer inspection firewalls.
Packet filtering firewalls work at the network level of the OSI model, or the IP layer of
TCP/IP. They are usually part of a router. A router is a device that receives packets from
one network and forwards them to another network. In a packet filtering firewall each
packet is compared to a set of criteria before it is forwarded. Depending on the packet
and the criteria, the firewall can drop the packet, forward it or send a message to the
originator. Rules can include source and destination IP address, source and destination
port number and protocol used. The advantage of packet filtering firewalls is their low
cost and low impact on network performance. Most routers support packet filtering. Even
if other firewalls are used, implementing packet filtering at the router level affords an
initial degree of security at a low network layer. This type of firewall only works at the
network layer however and does not support sophisticated rule based models. Network
Address Translation (NAT) routers offer the advantages of packet filtering firewalls but
can also hide the IP addresses of computers behind the firewall, and offer a level of
circuit-based filtering.
Filtering firewalls can be classified according to types of filtering:


         Static Filtering – is being implemented by most routers. Rules of filters are

            adjusted manually.

         Dynamic Filtering – allows filtering rules to change depending on responses to

            outside processes.
                                    Hybrid firewall

       Hybrid firewalls as the name suggests, represent a combination of technologies. A

hybrid firewall may consist of a pocket filtering combined with an application proxy

firewall, or a circuit gateway combined with an application proxy firewall.


       The following types of firewalls are classified by intended application:


   1. PC Firewalls

   2. SOHO Firewalls

   3. Firewall Appliances

   4. Large Enterprise Type Firewalls


       PC Firewalls – are known as firewalls for personal use and are designed in such a

       way as to provide a satisfactory level of protection to users of single computers.
SOHO Firewalls – Small Office/Home Office firewalls are designed for small

       businesses with no dedicated information technology personnel. These type of

       firewalls offer simple configuration and sophisticated security levels. Usually

       SOHO firewalls are hardware appliances.


          Firewall Appliances – aimed at meeting requirements of small businesses and

       remote offices of large enterprises. Firewall appliances are specialized systems

       with fewer option configuration in comparison to those of a large enterprise

       firewalls. The distinction between firewall appliances and large enterprise level

       firewalls is identified in lesser amount of functionality, and absence of unnecessary

       security levels.


          Large Enterprise Type Firewalls – are usually hardware devices with extra

       features required for protection of a large business. These features typically

       include centralized administration, multi-firewall administration, and support for

       Internet, Intranet, and Extranet services.

How firewall works?
There are two access denial methodologies used by firewalls. A firewall may allow all
traffic through unless it meets certain criteria, or it may deny all traffic unless it meets
certain criteria. The type of criteria used to determine whether traffic should be allowed
through varies from one type of firewall to another. Firewalls may be concerned with the
type of traffic, or with source or destination addresses and ports. They may also use
complex rule bases that analyses the application data to determine if the traffic should be
allowed through. How a firewall determines what traffic to let through depends on which
network layer it operates at. A discussion on network layers and architecture follows.
List of firewall using in Linux operating system?
   1. Lptables
   2. Lpcop
   3. Shorewall
   4.    UFW – Uncomplicated Firewall
   5.    OpenBSD and PF
   6.    EBox platform
   7.    Monowall
   8.    Clear os
   9.    pfSense
   10.   Smoothwall Advanced

List of firewall using in Windows operating system?
  1. Zone Alarm firewall
  2. Shardaccess
  3. Mpssvc

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Firewall
FirewallFirewall
Firewall
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Firewall
FirewallFirewall
Firewall
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall Basing
Firewall BasingFirewall Basing
Firewall Basing
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 

Destacado

Intruders
IntrudersIntruders
Intruderstechn
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
Jamaica Bay Rockaway Parks Conservancy Update
Jamaica Bay Rockaway Parks Conservancy UpdateJamaica Bay Rockaway Parks Conservancy Update
Jamaica Bay Rockaway Parks Conservancy Updateecowatchers
 
9 jamaica bay wildlife refuge 2015
9 jamaica bay wildlife refuge 20159 jamaica bay wildlife refuge 2015
9 jamaica bay wildlife refuge 2015ecowatchers
 
Jamaica Bay Greenway
Jamaica Bay GreenwayJamaica Bay Greenway
Jamaica Bay Greenwayecowatchers
 
Nps presentaion on horshoe crabs in jamaica bay
Nps presentaion on horshoe crabs in jamaica bayNps presentaion on horshoe crabs in jamaica bay
Nps presentaion on horshoe crabs in jamaica bayecowatchers
 
Usace new york harbor drift removal
Usace new york harbor drift removalUsace new york harbor drift removal
Usace new york harbor drift removalecowatchers
 
Dep head of bay oyster project jam bay task force fall 2017 update
Dep head of bay oyster project jam bay task force fall 2017 updateDep head of bay oyster project jam bay task force fall 2017 update
Dep head of bay oyster project jam bay task force fall 2017 updateecowatchers
 
Rulers Bar/Blackwall island update 10 29 15 Elizabeth Manclarke-ALS
Rulers Bar/Blackwall island update 10 29 15 Elizabeth Manclarke-ALSRulers Bar/Blackwall island update 10 29 15 Elizabeth Manclarke-ALS
Rulers Bar/Blackwall island update 10 29 15 Elizabeth Manclarke-ALSecowatchers
 
Fall 2015-Sunset Cove Update
Fall 2015-Sunset Cove UpdateFall 2015-Sunset Cove Update
Fall 2015-Sunset Cove Updateecowatchers
 
Blackwall island planting project
Blackwall island planting projectBlackwall island planting project
Blackwall island planting projectecowatchers
 
May 5 2016 NPS presentation-update on west pond breach repairs
May 5 2016 NPS presentation-update on west pond breach repairsMay 5 2016 NPS presentation-update on west pond breach repairs
May 5 2016 NPS presentation-update on west pond breach repairsecowatchers
 
Nps presentation on restoration plans for north and south garden
Nps presentation on restoration plans for north and south gardenNps presentation on restoration plans for north and south garden
Nps presentation on restoration plans for north and south gardenecowatchers
 
Dep head of bay oyster project jam bay task force november 2016
Dep head of bay oyster project jam bay task force november 2016Dep head of bay oyster project jam bay task force november 2016
Dep head of bay oyster project jam bay task force november 2016ecowatchers
 

Destacado (20)

Firewall
Firewall Firewall
Firewall
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
Intruders
IntrudersIntruders
Intruders
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Jamaica Bay Rockaway Parks Conservancy Update
Jamaica Bay Rockaway Parks Conservancy UpdateJamaica Bay Rockaway Parks Conservancy Update
Jamaica Bay Rockaway Parks Conservancy Update
 
9 jamaica bay wildlife refuge 2015
9 jamaica bay wildlife refuge 20159 jamaica bay wildlife refuge 2015
9 jamaica bay wildlife refuge 2015
 
Jamaica Bay Greenway
Jamaica Bay GreenwayJamaica Bay Greenway
Jamaica Bay Greenway
 
Nps presentaion on horshoe crabs in jamaica bay
Nps presentaion on horshoe crabs in jamaica bayNps presentaion on horshoe crabs in jamaica bay
Nps presentaion on horshoe crabs in jamaica bay
 
Usace new york harbor drift removal
Usace new york harbor drift removalUsace new york harbor drift removal
Usace new york harbor drift removal
 
Dep head of bay oyster project jam bay task force fall 2017 update
Dep head of bay oyster project jam bay task force fall 2017 updateDep head of bay oyster project jam bay task force fall 2017 update
Dep head of bay oyster project jam bay task force fall 2017 update
 
Rulers Bar/Blackwall island update 10 29 15 Elizabeth Manclarke-ALS
Rulers Bar/Blackwall island update 10 29 15 Elizabeth Manclarke-ALSRulers Bar/Blackwall island update 10 29 15 Elizabeth Manclarke-ALS
Rulers Bar/Blackwall island update 10 29 15 Elizabeth Manclarke-ALS
 
Fall 2015-Sunset Cove Update
Fall 2015-Sunset Cove UpdateFall 2015-Sunset Cove Update
Fall 2015-Sunset Cove Update
 
Blackwall island planting project
Blackwall island planting projectBlackwall island planting project
Blackwall island planting project
 
May 5 2016 NPS presentation-update on west pond breach repairs
May 5 2016 NPS presentation-update on west pond breach repairsMay 5 2016 NPS presentation-update on west pond breach repairs
May 5 2016 NPS presentation-update on west pond breach repairs
 
Nps presentation on restoration plans for north and south garden
Nps presentation on restoration plans for north and south gardenNps presentation on restoration plans for north and south garden
Nps presentation on restoration plans for north and south garden
 
Dep head of bay oyster project jam bay task force november 2016
Dep head of bay oyster project jam bay task force november 2016Dep head of bay oyster project jam bay task force november 2016
Dep head of bay oyster project jam bay task force november 2016
 
Iciea08
Iciea08Iciea08
Iciea08
 

Similar a Firewall

Similar a Firewall (20)

firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall
FirewallFirewall
Firewall
 
What is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxWhat is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptx
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewalls
FirewallsFirewalls
Firewalls
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxFirewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptx
 
Note8
Note8Note8
Note8
 
Firewalls in network
Firewalls in networkFirewalls in network
Firewalls in network
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Firewall security in computer security
Firewall security in computer security Firewall security in computer security
Firewall security in computer security
 
Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptx
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
What are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdfWhat are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdf
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 

Más de syeda zoya mehdi

Game playing in artificial intelligent technique
Game playing in artificial intelligent technique Game playing in artificial intelligent technique
Game playing in artificial intelligent technique syeda zoya mehdi
 
Maslow, herzberg, mc clelland, ouchi, thamhain and wilemon and convey theories
Maslow, herzberg, mc clelland, ouchi, thamhain and wilemon and convey theoriesMaslow, herzberg, mc clelland, ouchi, thamhain and wilemon and convey theories
Maslow, herzberg, mc clelland, ouchi, thamhain and wilemon and convey theoriessyeda zoya mehdi
 
Project quality management
Project quality managementProject quality management
Project quality managementsyeda zoya mehdi
 
Mobile phone calling and texting college students in pakistan
Mobile phone calling and texting college students in pakistanMobile phone calling and texting college students in pakistan
Mobile phone calling and texting college students in pakistansyeda zoya mehdi
 
Introduction of javascript
Introduction of javascriptIntroduction of javascript
Introduction of javascriptsyeda zoya mehdi
 
Php update and delet operation
Php update and delet operationPhp update and delet operation
Php update and delet operationsyeda zoya mehdi
 

Más de syeda zoya mehdi (10)

Sony nextep
Sony nextepSony nextep
Sony nextep
 
Android vs window
Android vs windowAndroid vs window
Android vs window
 
Game playing in artificial intelligent technique
Game playing in artificial intelligent technique Game playing in artificial intelligent technique
Game playing in artificial intelligent technique
 
Maslow, herzberg, mc clelland, ouchi, thamhain and wilemon and convey theories
Maslow, herzberg, mc clelland, ouchi, thamhain and wilemon and convey theoriesMaslow, herzberg, mc clelland, ouchi, thamhain and wilemon and convey theories
Maslow, herzberg, mc clelland, ouchi, thamhain and wilemon and convey theories
 
Project quality management
Project quality managementProject quality management
Project quality management
 
Mobile phone calling and texting college students in pakistan
Mobile phone calling and texting college students in pakistanMobile phone calling and texting college students in pakistan
Mobile phone calling and texting college students in pakistan
 
Table through php
Table through phpTable through php
Table through php
 
Introduction of javascript
Introduction of javascriptIntroduction of javascript
Introduction of javascript
 
Php update and delet operation
Php update and delet operationPhp update and delet operation
Php update and delet operation
 
Windows phone
Windows phoneWindows phone
Windows phone
 

Último

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Último (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Firewall

  • 2. What is firewall? A firewall can either be software-based or hardware-based and is used to help keep a network secure. A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. It is a set of related programs, located at a network gateway server, which protects the resources of a private network from users from other networks. Basically, a firewall, working closely with a router program, examines each network packetto determine whether to forward it toward its destination. A firewall also includes or works with a proxy server that makes network requests on behalf of workstation users. A firewall is often installed in a specially designated computer separate from the rest of the network so that no incoming request can get directly at private network resources. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted. Explain different type of firewall? Types of firewall: Network layer firewall Application layer firewall Circuit layer firewall Stateful multi-layer inspection firewall
  • 3. Proxy firewall Host-based firewall Packet filtering Hybrid firewall Network layer firewall The first generation of firewalls (c. 1988) worked at the network level by inspecting packet headers and filtering traffic based on the IP address of the source and the destination, the port and the service. Some of these primeval security applications could also filter packets based on protocols, the domain name of the source and a few other attributes. Network layer firewalls generally make their decisions based on the source address, destination address and ports in individual IP packets. A simple router is the traditional network layer firewall, since it is not able to make particularly complicated decisions about what a packet is actually talking to or where it actually came from. Modern network layer firewalls have become increasingly more sophisticated, and now maintain internal information about the state of connections passing through them at any time. One important difference about many network layer firewalls is that they route traffic directly through them, which means in order to use one, you either need to have a validly-assigned IP address block or a private Internet address block. Network layer firewalls tend to be very fast and almost transparent to their users.
  • 4. Application layer firewall Application-level firewalls (sometimes called proxies) have been looking more deeply into the application data going through their filters. Application layer firewalls defined, are hosts running proxy servers, which permit no traffic directly between networks, and they perform elaborate logging and examination of traffic passing through them. By considering the context of client requests and application responses, these firewalls attempt to enforce correct application behavior; block malicious activity and help organizations ensure the safety of sensitive information and systems. They can log user activity too. Application-level filtering may include protection against spam and viruses as well, and be able to block undesirable Web sites based on content rather than just their IP address. If that sounds too good to be true, it is. The downside to deep packet inspection is that the more closely a firewall examines network data flow, the longer it takes, and the heavier hit your network performance will sustain. This is why the highest-end security appliances include lots of RAM to speed packet processing. And of course you'll pay for the added chips. Application layer firewalls defined, are hosts running proxy servers, which permit no traffic directly between networks, and they perform elaborate logging and examination of traffic passing through them. Since proxy applications are simply software running on the firewall, it is a good place to do lots of logging and access control. Application layer firewalls can be used as network address translators, since traffic goes in one side and out the other, after having passed through an application that effectively masks the origin of the initiating connection. However, run-of-the-mill network firewalls can't properly defend applications. As Michael Cobb explains, application-layer firewalls offer Layer 7 security on a more granular level, and may even help organizations get more out of existing network devices.
  • 5. Circuit layer firewall These applications, which represent the second-generation of firewall technology, monitor TCP handshaking between packets to make sure a session is legitimate. Traffic is filtered based on specified session rules and may be restricted to recognized computers only. Circuit-level firewalls hide the network itself from the outside, which is useful for denying access to intruders. But they don't filter individual packets. Applies security mechanism when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. Circuit gateways firewalls function at the network transport layer. They allow or deny connections based on addresses and prevent direct connection between networks. Stateful multi-layer inspection firewall Stateful multilayer inspection firewalls combine the aspects of the other three types of firewalls. SML vendors claim that their products deploy the best features of the other
  • 6. three firewall types. They filter packets at the network level and they recognize and process application-level data, but since they don't employ proxies, they deliver reasonably good performance in spite of the deep packet analysis. On the downside, they are not cheap, and they can be difficult to configure and administer. They filter packets at the network layer, determine whether session packets are legitimate and evaluate contents of packets at the application layer. They allow direct connection between client and host, alleviating the problem caused by the lack of transparency of application level gateways. They rely on algorithms to recognize and process application layer data instead of running application specific proxies. Stateful multilayer inspection firewalls offer a high level of security, good performance and transparency to end users. They are expensive however, and due to their complexity are potentially less secure than simpler types of firewalls if not administered by highly competent personnel. Proxy firewall Proxy firewalls offer more security than other types of firewalls, but this is at the expense of speed and functionality, as they can limit which applications your network can support. Proxy firewalls also provide comprehensive, protocol-aware security analysis for the protocols they support. This allows them to make better security decisions than products that focus purely on packet header information. Intercepts all messages entering and leaving the network. The proxy server efficiently hides the true network addresses. Host-based firewall
  • 7. Network perimeter firewalls cannot provide protection for traffic generated inside a trusted network. For this reason, host-based firewalls running on individual computers are needed. Host-based firewalls, of which Windows Firewall with Advanced Security is an example, protect a host from unauthorized access and attack. In addition to blocking unwanted incoming traffic, you can configure Windows Firewall with Advanced Security to block specific types of outgoing traffic as well. Host-based firewalls provide an extra layer of security in a network and function as integral components in a complete defense strategy. In Windows Firewall with Advanced Security, firewall filtering and IPsec are integrated. This integration greatly reduces the possibility of conflict between firewall rules and IPsec connection security settings. Packet filtering Firewalls fall into four broad categories: packet filters, circuit level gateways, application level gateways and stateful multilayer inspection firewalls. Packet filtering firewalls work at the network level of the OSI model, or the IP layer of TCP/IP. They are usually part of a router. A router is a device that receives packets from one network and forwards them to another network. In a packet filtering firewall each packet is compared to a set of criteria before it is forwarded. Depending on the packet and the criteria, the firewall can drop the packet, forward it or send a message to the originator. Rules can include source and destination IP address, source and destination port number and protocol used. The advantage of packet filtering firewalls is their low cost and low impact on network performance. Most routers support packet filtering. Even if other firewalls are used, implementing packet filtering at the router level affords an initial degree of security at a low network layer. This type of firewall only works at the network layer however and does not support sophisticated rule based models. Network Address Translation (NAT) routers offer the advantages of packet filtering firewalls but can also hide the IP addresses of computers behind the firewall, and offer a level of circuit-based filtering.
  • 8. Filtering firewalls can be classified according to types of filtering:  Static Filtering – is being implemented by most routers. Rules of filters are adjusted manually.  Dynamic Filtering – allows filtering rules to change depending on responses to outside processes. Hybrid firewall Hybrid firewalls as the name suggests, represent a combination of technologies. A hybrid firewall may consist of a pocket filtering combined with an application proxy firewall, or a circuit gateway combined with an application proxy firewall. The following types of firewalls are classified by intended application: 1. PC Firewalls 2. SOHO Firewalls 3. Firewall Appliances 4. Large Enterprise Type Firewalls PC Firewalls – are known as firewalls for personal use and are designed in such a way as to provide a satisfactory level of protection to users of single computers.
  • 9. SOHO Firewalls – Small Office/Home Office firewalls are designed for small businesses with no dedicated information technology personnel. These type of firewalls offer simple configuration and sophisticated security levels. Usually SOHO firewalls are hardware appliances. Firewall Appliances – aimed at meeting requirements of small businesses and remote offices of large enterprises. Firewall appliances are specialized systems with fewer option configuration in comparison to those of a large enterprise firewalls. The distinction between firewall appliances and large enterprise level firewalls is identified in lesser amount of functionality, and absence of unnecessary security levels. Large Enterprise Type Firewalls – are usually hardware devices with extra features required for protection of a large business. These features typically include centralized administration, multi-firewall administration, and support for Internet, Intranet, and Extranet services. How firewall works? There are two access denial methodologies used by firewalls. A firewall may allow all traffic through unless it meets certain criteria, or it may deny all traffic unless it meets certain criteria. The type of criteria used to determine whether traffic should be allowed through varies from one type of firewall to another. Firewalls may be concerned with the type of traffic, or with source or destination addresses and ports. They may also use complex rule bases that analyses the application data to determine if the traffic should be allowed through. How a firewall determines what traffic to let through depends on which network layer it operates at. A discussion on network layers and architecture follows.
  • 10. List of firewall using in Linux operating system? 1. Lptables 2. Lpcop 3. Shorewall 4. UFW – Uncomplicated Firewall 5. OpenBSD and PF 6. EBox platform 7. Monowall 8. Clear os 9. pfSense 10. Smoothwall Advanced List of firewall using in Windows operating system? 1. Zone Alarm firewall 2. Shardaccess 3. Mpssvc