SlideShare a Scribd company logo
1 of 10
PREPARED BY : PINA CHHATRALA 1
Milestone
 Firewall Basing
 Bastion Host
 Host – based firewall
 Personal firewall
PREPARED BY : PINA CHHATRALA 2
PREPARED BY : PINA CHHATRALA 3
Firewall Basing
Bastion Host
 A bastion host is a system identified by the firewall administrator
as a critical strong point in the network’s security.
 It serves as a platform for an application – level or circuit – level
gateway.
 Some common characteristics :
 Executes a secure version of its OS, making it a hardened
system.
 Only the services that the network administrator considers
essential are installed on the bastion host.
PREPARED BY : PINA CHHATRALA 4
Bastion Host
 Some common characteristics :
 It may require some additional authentication before user
is allowed access to the proxy services.
 Each proxy is configured to support only a subset of the
standard application’s command set.
 Each proxy is configured to allow access only to specific
host systems.
 Each proxy maintains detailed audit information by logging
all traffic.
PREPARED BY : PINA CHHATRALA 5
Bastion Host
 Some common characteristics :
 Each proxy module is a very small software package
specifically designed for network security.
 Each proxy is independent of other proxies on the bastion
host.
 A proxy generally performs no disk access other than to
read its initial configuration file.
 Each proxy runs as a nonprivilaged user in a private and
secured dictionary on the bastion host.
PREPARED BY : PINA CHHATRALA 6
Host – based Firewalls
 A host – based firewall is a software module used to secure an
individual host.
 Such modules are available in many OSs or can be provided as
an add-on packages.
 It filters and restricts the flow of packages.
 A common location for such firewalls is a server.
 Advantage :
 Filtering rules can be tailored to the host environment.
 Protection is provided independent of technology.
PREPARED BY : PINA CHHATRALA 7
Personal Firewalls
 Personal firewall controls traffic between a personal computer
or work – stations on one side and the Internet or Enterprise
network on the other side.
 These functionality can be used in the home environment and
on corporate internets.
 It is the software module on the personal computer.
 Firewall functionality can also be housed in a router that
connects all of the home computers to a DSL, cable modem, or
other internet interface.
PREPARED BY : PINA CHHATRALA 8
Personal Firewalls
 They are typically much less complex than either server – based
firewalls or stand – alone firewalls.
 The primary role of the personal firewall is to deny the
unauthorized remote access to the computer.
 The firewall can also monitor the outgoing activity is an attempt
to detect and block worms and other malware.
PREPARED BY : PINA CHHATRALA 9
PREPARED BY : PINA CHHATRALA 10

More Related Content

What's hot

Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7AfiqEfendy Zaen
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filtersMOHIT AGARWAL
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating Systemsohaildanish
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating systemAbou Bakr Ashraf
 

What's hot (20)

Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Software security
Software securitySoftware security
Software security
 
Network security
Network securityNetwork security
Network security
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Email security
Email securityEmail security
Email security
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 
S/MIME
S/MIMES/MIME
S/MIME
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 

Viewers also liked

Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewallsrajakhurram
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Networkfaisalmalik
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemSweta Sharma
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)shraddha_b
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
Firewall
FirewallFirewall
FirewallApo
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)david rom
 

Viewers also liked (14)

Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Honey Pot
Honey PotHoney Pot
Honey Pot
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Vpn
VpnVpn
Vpn
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Firewall
FirewallFirewall
Firewall
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 

Similar to Firewall Basing (20)

[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdf
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall
FirewallFirewall
Firewall
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 

Recently uploaded

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 

Firewall Basing

  • 1. PREPARED BY : PINA CHHATRALA 1
  • 2. Milestone  Firewall Basing  Bastion Host  Host – based firewall  Personal firewall PREPARED BY : PINA CHHATRALA 2
  • 3. PREPARED BY : PINA CHHATRALA 3 Firewall Basing
  • 4. Bastion Host  A bastion host is a system identified by the firewall administrator as a critical strong point in the network’s security.  It serves as a platform for an application – level or circuit – level gateway.  Some common characteristics :  Executes a secure version of its OS, making it a hardened system.  Only the services that the network administrator considers essential are installed on the bastion host. PREPARED BY : PINA CHHATRALA 4
  • 5. Bastion Host  Some common characteristics :  It may require some additional authentication before user is allowed access to the proxy services.  Each proxy is configured to support only a subset of the standard application’s command set.  Each proxy is configured to allow access only to specific host systems.  Each proxy maintains detailed audit information by logging all traffic. PREPARED BY : PINA CHHATRALA 5
  • 6. Bastion Host  Some common characteristics :  Each proxy module is a very small software package specifically designed for network security.  Each proxy is independent of other proxies on the bastion host.  A proxy generally performs no disk access other than to read its initial configuration file.  Each proxy runs as a nonprivilaged user in a private and secured dictionary on the bastion host. PREPARED BY : PINA CHHATRALA 6
  • 7. Host – based Firewalls  A host – based firewall is a software module used to secure an individual host.  Such modules are available in many OSs or can be provided as an add-on packages.  It filters and restricts the flow of packages.  A common location for such firewalls is a server.  Advantage :  Filtering rules can be tailored to the host environment.  Protection is provided independent of technology. PREPARED BY : PINA CHHATRALA 7
  • 8. Personal Firewalls  Personal firewall controls traffic between a personal computer or work – stations on one side and the Internet or Enterprise network on the other side.  These functionality can be used in the home environment and on corporate internets.  It is the software module on the personal computer.  Firewall functionality can also be housed in a router that connects all of the home computers to a DSL, cable modem, or other internet interface. PREPARED BY : PINA CHHATRALA 8
  • 9. Personal Firewalls  They are typically much less complex than either server – based firewalls or stand – alone firewalls.  The primary role of the personal firewall is to deny the unauthorized remote access to the computer.  The firewall can also monitor the outgoing activity is an attempt to detect and block worms and other malware. PREPARED BY : PINA CHHATRALA 9
  • 10. PREPARED BY : PINA CHHATRALA 10

Editor's Notes

  1. TCP connections : one between itself and a TCP user on an inner host and one between itself and TCP user on an outside host.
  2. TCP connections : one between itself and a TCP user on an inner host and one between itself and TCP user on an outside host.
  3. TCP connections : one between itself and a TCP user on an inner host and one between itself and TCP user on an outside host.
  4. TCP connections : one between itself and a TCP user on an inner host and one between itself and TCP user on an outside host.
  5. TCP connections : one between itself and a TCP user on an inner host and one between itself and TCP user on an outside host.
  6. TCP connections : one between itself and a TCP user on an inner host and one between itself and TCP user on an outside host.