SlideShare a Scribd company logo
1 of 19
PRESENTATION Fire Wall
PRESENTED BY:
Hasnain Ali Khan
BS- Computer Sciences
Arid Agriculture University Rawalpindi
FIRE WALL
Firewall is device that provides secure connectivity
between
networks(internal/external).
FIRE WALL
A firewall may be a
hardware, software or a
combination of both that
is used to prevent
unauthorized program or
internet users from
accessing a private
network or a single
computer.
All message entering or
leaving the intranet pass
through the firewall,
which examines each
message & blocks those
that do not meet the
specified security criteria.
WHY NEED OF FIREWALL?
To protect confidential
information from those
who do not explicitly need
to access it.
To protect our network &
its resources from
malicious users &
accidents that originate
outside of our network.
TYPES OF FIRE WALL
1. Hardware firewall
2. Software firewall
HARDWARE FIRE WALL
It is a physical device.
It can be installed
between the modem and
computer.
It can be incorporated
into a broadband router
being used to share the
internet connection.
Protect an entire network.
Usually more expensive,
header to configure
E.g.- Cisco pix, netscreen
, watchfuard etc.
HARDWARE FIREWALL
ADVANTAGES
Uses very little system resources.
More secure
Enhanced security control
Dedicated hardware firewalls are typically more
reliable
Easy to disable or remove
Work independently of associated computer system.
SOFTWARE FIRE WALL
It is a software application.
It is installed onto the computer system that you wish
to protect .
Protect a single computer
This is usually the computer with modem attached to
it.
Usually less expensive, easier to configure
E.g.- Norton internet security, McAfee internet security
etc.
SOFTWARE FIREWALL
ADVANTAGES
Considerably cheaper or even free.
Simple to install and upgrade
Requires no physical changes to hardware or network
Ideal for home/family use
Takes up no physical space.
FIREWALL TECHNIQUES
1. Packet filter
2. Application gateway/proxy server/proxy application
gateway
3. Circuit-level gateway
4. Bastion host
PACKET FILTER
It looks at each packet entering or leaving the
network,
Accepts or rejects it based on user-defined rules.
Packet filtering is fairly effective & transparent to
users, but it is difficult to configure.
APPLICATION GATEWAY/PROXY
SERVER/PROXY APPLICATION
GATEWAY
In such type of firewall remote host or network can
interact only with proxy server, proxy server is
responsible for hiding the details of the internal
network i.e. internet.
Users uses TCP/IP application, such as FTP & Telnet
servers.
CIRCUIT-LEVEL GATEWAY
It is a stand alone application.
It does not permit end-to-end TCP connection. It sets up 2 TCP
connection:-
• Between itself and a TCP user on an inner host.
• Between itself and a TCP user on an outer host.
BASTION HOST
Bastion host is a special purpose computer on a
network specifically designed and configured to
withstand attacks.
It generally hosts a single application, provides
platform for application gateway and circuit-level
gateway.
It supports limited/specific applications to reduce the
threat to the computer.
Include application-Telnet, SMTP, FTP
THANK YOU… 

More Related Content

What's hot

Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefitsAnthony Daniel
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technologySaumya Ranjan Behura
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...Mike Maurer
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015mauimarketing
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewallsrajakhurram
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix FirewallSouvik Santra
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configurationSoban Ahmad
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 

What's hot (20)

Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technology
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
 
Firewalls
FirewallsFirewalls
Firewalls
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
 
محمد
محمدمحمد
محمد
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 

Similar to Presentation on Firewalls: Types, Techniques and Why They Are Needed

FireWall
FireWallFireWall
FireWallrubal_9
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
Windows firewall
Windows firewallWindows firewall
Windows firewallVC Infotech
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdfImXaib
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET Journal
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...Pranav Gontalwar
 
Week14 Presentation
Week14 PresentationWeek14 Presentation
Week14 Presentationgueste7bef1
 
Firewall
FirewallFirewall
FirewallApo
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...ams1ams11
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfjibinsh
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinalmordannon
 

Similar to Presentation on Firewalls: Types, Techniques and Why They Are Needed (20)

FireWall
FireWallFireWall
FireWall
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate Environment
 
Firewall
FirewallFirewall
Firewall
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
 
Week14 Presentation
Week14 PresentationWeek14 Presentation
Week14 Presentation
 
Kerberos
KerberosKerberos
Kerberos
 
Firewall
FirewallFirewall
Firewall
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdf
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 

Recently uploaded

What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 

Recently uploaded (20)

What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 

Presentation on Firewalls: Types, Techniques and Why They Are Needed

  • 2. PRESENTED BY: Hasnain Ali Khan BS- Computer Sciences Arid Agriculture University Rawalpindi
  • 3. FIRE WALL Firewall is device that provides secure connectivity between networks(internal/external).
  • 4. FIRE WALL A firewall may be a hardware, software or a combination of both that is used to prevent unauthorized program or internet users from accessing a private network or a single computer. All message entering or leaving the intranet pass through the firewall, which examines each message & blocks those that do not meet the specified security criteria.
  • 5. WHY NEED OF FIREWALL? To protect confidential information from those who do not explicitly need to access it. To protect our network & its resources from malicious users & accidents that originate outside of our network.
  • 6. TYPES OF FIRE WALL 1. Hardware firewall 2. Software firewall
  • 7. HARDWARE FIRE WALL It is a physical device. It can be installed between the modem and computer. It can be incorporated into a broadband router being used to share the internet connection. Protect an entire network. Usually more expensive, header to configure E.g.- Cisco pix, netscreen , watchfuard etc.
  • 8. HARDWARE FIREWALL ADVANTAGES Uses very little system resources. More secure Enhanced security control Dedicated hardware firewalls are typically more reliable Easy to disable or remove Work independently of associated computer system.
  • 9. SOFTWARE FIRE WALL It is a software application. It is installed onto the computer system that you wish to protect . Protect a single computer This is usually the computer with modem attached to it. Usually less expensive, easier to configure E.g.- Norton internet security, McAfee internet security etc.
  • 10. SOFTWARE FIREWALL ADVANTAGES Considerably cheaper or even free. Simple to install and upgrade Requires no physical changes to hardware or network Ideal for home/family use Takes up no physical space.
  • 11. FIREWALL TECHNIQUES 1. Packet filter 2. Application gateway/proxy server/proxy application gateway 3. Circuit-level gateway 4. Bastion host
  • 12. PACKET FILTER It looks at each packet entering or leaving the network, Accepts or rejects it based on user-defined rules. Packet filtering is fairly effective & transparent to users, but it is difficult to configure.
  • 13.
  • 14. APPLICATION GATEWAY/PROXY SERVER/PROXY APPLICATION GATEWAY In such type of firewall remote host or network can interact only with proxy server, proxy server is responsible for hiding the details of the internal network i.e. internet. Users uses TCP/IP application, such as FTP & Telnet servers.
  • 15.
  • 16. CIRCUIT-LEVEL GATEWAY It is a stand alone application. It does not permit end-to-end TCP connection. It sets up 2 TCP connection:- • Between itself and a TCP user on an inner host. • Between itself and a TCP user on an outer host.
  • 17. BASTION HOST Bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks. It generally hosts a single application, provides platform for application gateway and circuit-level gateway. It supports limited/specific applications to reduce the threat to the computer. Include application-Telnet, SMTP, FTP
  • 18.