Successfully reported this slideshow.
Your SlideShare is downloading. ×

firewallpresentation-100826052003-phpapp02.pptx

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Loading in …3
×

Check these out next

1 of 19 Ad

More Related Content

Recently uploaded (20)

Advertisement

firewallpresentation-100826052003-phpapp02.pptx

  1. 1. PRESENTERS :- Mohamed Sh Ahmed Mohamed Presentation :’Firewalls’ 1
  2. 2. Table of Contents 2 INTRODUCTION HOW FIREWALLWORKS TYPES OF FIREWALLS MAKING THE FIREWALL FIT TESTING A FIREWALLCONFIGURATION CONCLUSION REFERENCES
  3. 3. Introduction Is hardware, software, or a combination of both used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. 3
  4. 4. Hardware vs. Software Firewalls 4 Hardware Firewalls  Protect an entire network  Implemented on the router level  Usually more expensive, harder to configure Software Firewalls  Protect a single computer  Usually less expensive, easier to configure
  5. 5. How does a software firewall work? 5 Inspects each individual “packet” of data as it arrives at either side of the firewall Determines whether it should be allowed to pass through or if it should be blocked
  6. 6. Firewall Rules 6 Allow – traffic that flows automatically because it has been deemed Block – traffic that is blocked because it has been deemed dangerous to your computer Ask – asks the user whether or not the traffic is allowed to pass through
  7. 7. What Can a Firewall Do? Focus for security decisions  Stop hackers from accessing your computer Can enforce security policy  Protects your personal information Limits your exposure  Blocks “pop up” ads and certain cookies Can log Internet activity efficiently  Determines which programs can access the Internet 7
  8. 8. What Can't a Firewall Do? Can't protect you against malicious insiders Can't protect you against connections that don't go through it Can't protect against completely new threats Can't protect against viruses 8
  9. 9. Types of Firewalls Packet Filtering Firewall Application level Gateway Circuit level gateway 9
  10. 10. Architectures for Firewall Single-BoxArchitecture 10
  11. 11. Screened Host Architecture 11
  12. 12. Making The Firewall Fit IP address Domain names Protocols Ports 12
  13. 13. What It Protects You From Remote login SMTP session hijacking Operating system bugs Spam E-mail bombs Source routing 13
  14. 14. Security Strategies implemented 14 Default Deny  Prohibit all communication that is not expressly permitted Default Permit  Permit all communication that is not explicitly prohibited Least Privilege  reduces the authorization level at which various actions are performed Defense in Depth  security approach whereby each system on the network is secured to the greatest possible degree Choke Point  forces attackers to use a narrow channel to bypass the network
  15. 15. Testing a Firewall Configuration 15 • A faster and easier method is available with the Linux firewall implementation • Allows you to manually generate tests • Suppose our local network is 172.16.1.0 • And we allow only TCPconnections
  16. 16. Example 16 # ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 80 -ieth0 accepted # ipchains -C forward -p tcp -s 172.16.2.0 1025 -d 44.136.8.2 80 -ieth0 denied # ipchains -C forward -p udp -s 172.16.1.0 1025 -d 44.136.8.2 80 -ieth0 denied # ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 23 -ieth0 denied source Destination Wrong Wrong Wrong
  17. 17. REFRENCES 17 www.howstuffworks.com www.securityfocus.com www.firewall.com
  18. 18. 18 Conclusion
  19. 19. T H A N K U TESTING A FIREWALLCONFIGURATION 19

×