FireWall

16,465 views

Published on

Published in: Technology
4 Comments
34 Likes
Statistics
Notes
No Downloads
Views
Total views
16,465
On SlideShare
0
From Embeds
0
Number of Embeds
83
Actions
Shares
0
Downloads
2,865
Comments
4
Likes
34
Embeds 0
No embeds

No notes for slide

FireWall

  1. 1. FIREWALL
  2. 2. Contents <ul><li>What is FireWall ? </li></ul><ul><li>- Software vs. Hardware Firewall </li></ul><ul><li>How does FireWall works ? </li></ul><ul><li>Types of FireWall Techniques – </li></ul><ul><li>> Packet filter > Application gateway </li></ul><ul><li>> Circuit level gateway > Bastion host </li></ul><ul><li>Conclusion: </li></ul><ul><li>- What FireWalls can do ? </li></ul><ul><li>- What FireWalls cannot do ? </li></ul>
  3. 3. What is FireWall ? <ul><li>FireWall is device that provides secure connectivity between networks (internal/external). </li></ul><ul><li>A firewall may be a hardware , software , or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. </li></ul>
  4. 4. Software vs. Hardware Firewalls Software Firewall Hardware Firewall <ul><ul><li>-Protect a single computer </li></ul></ul><ul><ul><li>-Usually less expensive, easier to configure </li></ul></ul><ul><ul><li>-Protect an entire network. </li></ul></ul><ul><li>-Usually more expensive, harder to configure </li></ul>Norton Internet Security Cisco PIX Mcafee Internet Security NetScreen Outpost WatchGuard Ms. ISA Server Check Point
  5. 5. How does a Firewall work? <ul><li>Inbound to or outbound from your computer. </li></ul><ul><li>Inspects each “ packet ” of data that arrives at either side of the firewall. </li></ul><ul><li>Determines whether it should be allowed to pass through or if it should be blocked . </li></ul>sent sent received received packets packets
  6. 6. How a firewall works ? <ul><li>Sniffing Mode </li></ul><ul><li>An attacker tries to compromise a service on the protected network. </li></ul><ul><li>2) The Firewall identifies the attempt . </li></ul><ul><li>The FIREWALL can now: </li></ul><ul><ul><li>Alert the admin </li></ul></ul><ul><ul><li>Harden the firewall </li></ul></ul><ul><ul><li>Or reset a TCP/IP connection </li></ul></ul>LOG Alert Reset Fire Wall 
  7. 7. Types of FireWall Techniques <ul><li>Packet filter </li></ul><ul><li>Application gateway (a.k.a. Proxy server) </li></ul><ul><li>Circuit-level gateway </li></ul><ul><li>Bastion Host </li></ul>
  8. 8. Packet filter - It looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules . Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing . Packet Filtering Applications Presentations Sessions Transport DataLink Physical DataLink Physical Router Applications Presentations Sessions Transport DataLink Physical Network Network
  9. 9. Application gateway Application gateway (Proxy Server)- User uses TCP/IP applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation. Applications Presentations Sessions Transport DataLink Physical Network DataLink Physical Applications Presentations Sessions Transport DataLink Physical Application Gateway Applications Presentations Sessions Transport Network Network Telnet HTTP FTP
  10. 10. Circuit-level gateway <ul><li>Circuit-level gateway- It is a stand alone application. </li></ul><ul><li>It does not permit end-to-end TCP connection. It sets up 2 TCP connections: </li></ul><ul><li>> B/w itself and a TCP user on an inner host. </li></ul><ul><li>> B/w itself and a TCP user on an outer host. </li></ul>
  11. 11. Bastion host <ul><li>> Bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks . </li></ul><ul><li>> It generally hosts a single application , provides platform for Application gateway and Circuit-level gateway. It supports limited/specific applications to reduce the threat to the computer. Include applications- Telnet,SMTP,FTP. </li></ul>
  12. 12. Conclusion <ul><li>What a firewall can do ? </li></ul><ul><li>What a firewall cannot do ? </li></ul>
  13. 13. What a personal firewall can do ? <ul><li>Stop hackers from accessing your computer. </li></ul><ul><li>Protects your personal information . </li></ul><ul><li>Blocks “ pop up ” ads and certain cookies . </li></ul><ul><li>Determines which programs can access the Internet. </li></ul><ul><li>Block invalid packets . </li></ul>
  14. 14. What a personal firewall cannot do ? <ul><li>Cannot prevent e-mail </li></ul><ul><li>viruses </li></ul><ul><ul><li>Only an antivirus product </li></ul></ul><ul><ul><li>with updated definitions can </li></ul></ul><ul><ul><li>prevent e-mail viruses. </li></ul></ul><ul><li>After setting it initially, you cannot forget about it </li></ul><ul><ul><li>The firewall will require periodic updates to the rulesets and the software itself. </li></ul></ul>Virus can jump Firewall !! F I R E W A L L Deadly Virus
  15. 15. SECURED Firewall Thank You…… Source – >CNS Text Book (William Stallings) > Wikipedia

×