SlideShare a Scribd company logo
1 of 26
FIREWALL
WHAT IS FIREWALL?
• Firewalls are hardware and/or software designed to invent unauthorized access
to or from a private network .
• Firewalls examine all messages entering or leaving the Internet and blocks those
that do not meet the specified security criteria.
• They are placed at the junction or gateway between the two networks, which is
usually a private network and a public network such as the Internet
WHAT IS FIREWALL?(CONT.)
• A firewall, is a system that allows you to protect a server or a network of servers
from intrusions coming from another network. The most common use is to protect
your Internet network.
THE NEED FOR FIREWALL
Internet connectivity is essential
however it creates a threat
Effective means of protecting LANs
 Inserted between the premises network and the Internet to establish a controlled link.
can be a single computer system or a set of two or more systems working together
Used as a perimeter defense
Single choke point to impose security and auditing
insulates the internal systems from external networks
FIREWALL CAPABILITIES AND LIMITS
Capabilities Limitations
A firewall defines a single choke
point that blocks malicious traffic.
Cannot protect against attacks
bypassing firewall
Provides a location for
security events .
May not protect fully against
internal threats
Convenient platform for several
Internet functions that are not
security related, which include
network address translator.
Improperly secured wireless LAN
can be accessed from outside the
organization
Can serve as the platform for
.
Laptop, PDA, or portable storage
device may be infected outside
corporate network then attached
used internally .
TYPES OF FIREWALLS
 Packet filtering firewall
 Stateful inspection firewall
 Application proxy firewall
 Circuit-level proxy firewall
PACKET FILTERING FIREWALL
Applies rules to each incoming and outgoing IP packet.
• Typically a list of rules based on matches in the IP or TCP header
• Forwards or discards the packet based on rules match
 Two default policies:
Discard - prohibit unless expressly permitted
• More conservative, controlled, visible to users
Forward - permit unless expressly prohibited
• Easier to manage and use but less secure
PACKET FILTER ADVANTAGES AND WEAKNESSES
Advantages
• Simplicity
• Typically transparent to users and are very fast
Weaknesses
• Cannot prevent attacks that employ application specific vulnerabilities or functions.
• Limited logging functionality
• Do not support advanced user authentication
• Vulnerable to attacks on TCP/IP protocol bugs.
• Improper configuration can lead to breaches
STATEFUL INSPECTION FIREWALLS
• Tightens rules for TCP traffic by creating a directory of outbound TCP connections
• there is an entry for each currently established connection
• packet filter allows incoming traffic to high numbered ports
• only for those packets that fit the profile of one of the entries
• Reviews packet information but also records information about TCP connections
• keeps track of TCP sequence numbers to prevent attacks that depend on the sequence
number
• inspects data for protocols like FTP, IM and SIPS commands
APPLICATION-LEVEL GATEWAY
• Also called an application proxy
• Acts as a relay of application-level traffic
• User contacts gateway using a TCP/IP appl.
• user is authenticated
• gateway contacts application on remote host and relays TCP segments between server and user
• Must have proxy code for each application
• may restrict application features supported
• Tend to be more secure than packet filters
• Disadvantage is the additional processing overhead on each connection
APPLICATION-LEVEL GATEWAY
CIRCUIT-LEVEL PROXY FIREWALL
• Circuit level proxy
• Sets up two TCP connections, one between itself and a TCP user on an inner host and one
on an outside host
• Relays TCP segments from one connection to the other without examining contents
• Security function consists of determining which connections will be allowed
• Typically used when inside users are trusted
• May use application-level gateway inbound and circuit-level gateway outbound
• Lower overheads
CIRCUIT-LEVEL PROXY FIREWALL
Packet filters
Application
Gateway
Circuit level Gateway Stateful filters
Simple and least
Most secure
approach
More secure than
packet filter but not
as secure as
application gateway.
Process packets at
very fast speeds
Many routers provide
this functionality
Unique program
each application
Relay TCP
connections
flexibility in
implementing
security policies
Passes or rejects
packets based on rules
good for
authentication and
logging
Permission granted
by port address
do not support user
authentication of
connections
Hard to manage
Not always
transparent to
No application level
checking
complex to configure
Easy to make mistakes
Used for email, FTP
,
TELNET, WWW
Can understand what
is carried in the
packet.
cannot prevent
application-layer
attacks
NETWORK SECURITY DEVICES
• Personal software firewalls
• Improved their functionality:
— Most personal software firewalls today also filter outbound traffic as well as inbound
traffic.
— Protects users by preventing malware from connecting to other computers and
spreading.
• Disadvantage: It is only as strong as the operating system of the computer.
NETWORK SECURITY DEVICES
• Hardware firewalls
 Run their own OS
 Usually located outside the network security perimeter as first line of defense
 Disadvantage: Can be expensive
CISCO ASA
In computer networking, Cisco ASA 5500 Series Adaptive Security Appliances, or simply Cisco ASA,
is Cisc’s line of network security devices introduced in May 2005.
Cisco ASA has become one of the most widely used firewall/VPN solutions for small to medium
businesses. Early reviews indicated the Cisco GUI tools for managing the device were lacking.
“A firewall cant stop an idea”
BaDBoY-ALbania
QUESTIONS :
Q1: What is firewall ?
Q2: List the types of firewall ?
Q3: what is alternate name of Application level gateway?
Thank you for listening
to our presentation

More Related Content

What's hot

Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix FirewallSouvik Santra
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
Free OpManager training_Part 1- Discovery & classification
Free OpManager training_Part 1- Discovery & classificationFree OpManager training_Part 1- Discovery & classification
Free OpManager training_Part 1- Discovery & classificationManageEngine, Zoho Corporation
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Radhika Talaviya
 
Ch 13: Network Protection Systems
Ch 13: Network Protection SystemsCh 13: Network Protection Systems
Ch 13: Network Protection SystemsSam Bowne
 
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden ThreatCNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden ThreatSam Bowne
 
New OpManager v12
New OpManager v12New OpManager v12
New OpManager v12Inuit AB
 
eWON_SecurityV5 - Public
eWON_SecurityV5 - PubliceWON_SecurityV5 - Public
eWON_SecurityV5 - PublicYvan Rudzinski
 

What's hot (19)

Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
Firewall
FirewallFirewall
Firewall
 
Network scanner
Network  scannerNetwork  scanner
Network scanner
 
Firewall Modified
Firewall ModifiedFirewall Modified
Firewall Modified
 
firewalls
firewallsfirewalls
firewalls
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Free OpManager training_Part 1- Discovery & classification
Free OpManager training_Part 1- Discovery & classificationFree OpManager training_Part 1- Discovery & classification
Free OpManager training_Part 1- Discovery & classification
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
Firewall intro
Firewall introFirewall intro
Firewall intro
 
fire walls
fire wallsfire walls
fire walls
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Ch 13: Network Protection Systems
Ch 13: Network Protection SystemsCh 13: Network Protection Systems
Ch 13: Network Protection Systems
 
Firewall
FirewallFirewall
Firewall
 
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden ThreatCNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
 
Advance firewalls
Advance firewallsAdvance firewalls
Advance firewalls
 
ManageEngine Firewall Analyzer training
ManageEngine Firewall Analyzer trainingManageEngine Firewall Analyzer training
ManageEngine Firewall Analyzer training
 
New OpManager v12
New OpManager v12New OpManager v12
New OpManager v12
 
eWON_SecurityV5 - Public
eWON_SecurityV5 - PubliceWON_SecurityV5 - Public
eWON_SecurityV5 - Public
 
Virtual Firewall Management
Virtual Firewall ManagementVirtual Firewall Management
Virtual Firewall Management
 

Similar to Firewall

Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
BAIT1103 Chapter 8
BAIT1103 Chapter 8BAIT1103 Chapter 8
BAIT1103 Chapter 8limsh
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)Zara Nawaz
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)Jainam Shah
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filtersMOHIT AGARWAL
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxShreyaBanerjee52
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 
Unit 5.3_Firewalls (1).ppt
Unit 5.3_Firewalls (1).pptUnit 5.3_Firewalls (1).ppt
Unit 5.3_Firewalls (1).pptAnuReddy68
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.pptKaushal72
 

Similar to Firewall (20)

Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
BAIT1103 Chapter 8
BAIT1103 Chapter 8BAIT1103 Chapter 8
BAIT1103 Chapter 8
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
 
firewall
firewallfirewall
firewall
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall
FirewallFirewall
Firewall
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Divyanshu.pptx
Divyanshu.pptxDivyanshu.pptx
Divyanshu.pptx
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Unit 5.3_Firewalls (1).ppt
Unit 5.3_Firewalls (1).pptUnit 5.3_Firewalls (1).ppt
Unit 5.3_Firewalls (1).ppt
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
 
Firewall
FirewallFirewall
Firewall
 

Recently uploaded

(SANA) Call Girls Landewadi ( 7001035870 ) HI-Fi Pune Escorts Service
(SANA) Call Girls Landewadi ( 7001035870 ) HI-Fi Pune Escorts Service(SANA) Call Girls Landewadi ( 7001035870 ) HI-Fi Pune Escorts Service
(SANA) Call Girls Landewadi ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,Pooja Nehwal
 
定制(USF学位证)旧金山大学毕业证成绩单原版一比一
定制(USF学位证)旧金山大学毕业证成绩单原版一比一定制(USF学位证)旧金山大学毕业证成绩单原版一比一
定制(USF学位证)旧金山大学毕业证成绩单原版一比一ss ss
 
萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程1k98h0e1
 
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service SaharanpurVIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service SaharanpurSuhani Kapoor
 
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...Pooja Nehwal
 
Call Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile serviceCall Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile servicerehmti665
 
(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一C SSS
 
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝soniya singh
 
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Bookvip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Bookmanojkuma9823
 
Presentation.pptxjnfoigneoifnvoeifnvklfnvf
Presentation.pptxjnfoigneoifnvoeifnvklfnvfPresentation.pptxjnfoigneoifnvoeifnvklfnvf
Presentation.pptxjnfoigneoifnvoeifnvklfnvfchapmanellie27
 
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一zul5vf0pq
 
Vip Noida Escorts 9873940964 Greater Noida Escorts Service
Vip Noida Escorts 9873940964 Greater Noida Escorts ServiceVip Noida Escorts 9873940964 Greater Noida Escorts Service
Vip Noida Escorts 9873940964 Greater Noida Escorts Serviceankitnayak356677
 
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一diploma 1
 
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查awo24iot
 
Call Girls In Munirka>༒9599632723 Incall_OutCall Available
Call Girls In Munirka>༒9599632723 Incall_OutCall AvailableCall Girls In Munirka>༒9599632723 Incall_OutCall Available
Call Girls In Munirka>༒9599632723 Incall_OutCall AvailableCall Girls in Delhi
 
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...ranjana rawat
 
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /WhatsappsBeautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsappssapnasaifi408
 

Recently uploaded (20)

(SANA) Call Girls Landewadi ( 7001035870 ) HI-Fi Pune Escorts Service
(SANA) Call Girls Landewadi ( 7001035870 ) HI-Fi Pune Escorts Service(SANA) Call Girls Landewadi ( 7001035870 ) HI-Fi Pune Escorts Service
(SANA) Call Girls Landewadi ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
 
定制(USF学位证)旧金山大学毕业证成绩单原版一比一
定制(USF学位证)旧金山大学毕业证成绩单原版一比一定制(USF学位证)旧金山大学毕业证成绩单原版一比一
定制(USF学位证)旧金山大学毕业证成绩单原版一比一
 
萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程萨斯喀彻温大学毕业证学位证成绩单-购买流程
萨斯喀彻温大学毕业证学位证成绩单-购买流程
 
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service SaharanpurVIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
 
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
 
Call Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile serviceCall Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile service
 
(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一
 
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
 
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Bookvip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
 
Presentation.pptxjnfoigneoifnvoeifnvklfnvf
Presentation.pptxjnfoigneoifnvoeifnvklfnvfPresentation.pptxjnfoigneoifnvoeifnvklfnvf
Presentation.pptxjnfoigneoifnvoeifnvklfnvf
 
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
定制加拿大滑铁卢大学毕业证(Waterloo毕业证书)成绩单(文凭)原版一比一
 
9953330565 Low Rate Call Girls In Jahangirpuri Delhi NCR
9953330565 Low Rate Call Girls In Jahangirpuri  Delhi NCR9953330565 Low Rate Call Girls In Jahangirpuri  Delhi NCR
9953330565 Low Rate Call Girls In Jahangirpuri Delhi NCR
 
Vip Noida Escorts 9873940964 Greater Noida Escorts Service
Vip Noida Escorts 9873940964 Greater Noida Escorts ServiceVip Noida Escorts 9873940964 Greater Noida Escorts Service
Vip Noida Escorts 9873940964 Greater Noida Escorts Service
 
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
 
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
 
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Serviceyoung call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
 
Call Girls In Munirka>༒9599632723 Incall_OutCall Available
Call Girls In Munirka>༒9599632723 Incall_OutCall AvailableCall Girls In Munirka>༒9599632723 Incall_OutCall Available
Call Girls In Munirka>༒9599632723 Incall_OutCall Available
 
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
 
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /WhatsappsBeautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
Beautiful Sapna Call Girls CP 9711199012 ☎ Call /Whatsapps
 

Firewall

  • 2. WHAT IS FIREWALL? • Firewalls are hardware and/or software designed to invent unauthorized access to or from a private network . • Firewalls examine all messages entering or leaving the Internet and blocks those that do not meet the specified security criteria. • They are placed at the junction or gateway between the two networks, which is usually a private network and a public network such as the Internet
  • 3. WHAT IS FIREWALL?(CONT.) • A firewall, is a system that allows you to protect a server or a network of servers from intrusions coming from another network. The most common use is to protect your Internet network.
  • 4. THE NEED FOR FIREWALL Internet connectivity is essential however it creates a threat Effective means of protecting LANs  Inserted between the premises network and the Internet to establish a controlled link. can be a single computer system or a set of two or more systems working together Used as a perimeter defense Single choke point to impose security and auditing insulates the internal systems from external networks
  • 5. FIREWALL CAPABILITIES AND LIMITS Capabilities Limitations A firewall defines a single choke point that blocks malicious traffic. Cannot protect against attacks bypassing firewall Provides a location for security events . May not protect fully against internal threats Convenient platform for several Internet functions that are not security related, which include network address translator. Improperly secured wireless LAN can be accessed from outside the organization Can serve as the platform for . Laptop, PDA, or portable storage device may be infected outside corporate network then attached used internally .
  • 6. TYPES OF FIREWALLS  Packet filtering firewall  Stateful inspection firewall  Application proxy firewall  Circuit-level proxy firewall
  • 7. PACKET FILTERING FIREWALL Applies rules to each incoming and outgoing IP packet. • Typically a list of rules based on matches in the IP or TCP header • Forwards or discards the packet based on rules match  Two default policies: Discard - prohibit unless expressly permitted • More conservative, controlled, visible to users Forward - permit unless expressly prohibited • Easier to manage and use but less secure
  • 8. PACKET FILTER ADVANTAGES AND WEAKNESSES Advantages • Simplicity • Typically transparent to users and are very fast Weaknesses • Cannot prevent attacks that employ application specific vulnerabilities or functions. • Limited logging functionality • Do not support advanced user authentication • Vulnerable to attacks on TCP/IP protocol bugs. • Improper configuration can lead to breaches
  • 9.
  • 10.
  • 11. STATEFUL INSPECTION FIREWALLS • Tightens rules for TCP traffic by creating a directory of outbound TCP connections • there is an entry for each currently established connection • packet filter allows incoming traffic to high numbered ports • only for those packets that fit the profile of one of the entries • Reviews packet information but also records information about TCP connections • keeps track of TCP sequence numbers to prevent attacks that depend on the sequence number • inspects data for protocols like FTP, IM and SIPS commands
  • 12.
  • 13.
  • 14. APPLICATION-LEVEL GATEWAY • Also called an application proxy • Acts as a relay of application-level traffic • User contacts gateway using a TCP/IP appl. • user is authenticated • gateway contacts application on remote host and relays TCP segments between server and user • Must have proxy code for each application • may restrict application features supported • Tend to be more secure than packet filters • Disadvantage is the additional processing overhead on each connection
  • 16. CIRCUIT-LEVEL PROXY FIREWALL • Circuit level proxy • Sets up two TCP connections, one between itself and a TCP user on an inner host and one on an outside host • Relays TCP segments from one connection to the other without examining contents • Security function consists of determining which connections will be allowed • Typically used when inside users are trusted • May use application-level gateway inbound and circuit-level gateway outbound • Lower overheads
  • 18. Packet filters Application Gateway Circuit level Gateway Stateful filters Simple and least Most secure approach More secure than packet filter but not as secure as application gateway. Process packets at very fast speeds Many routers provide this functionality Unique program each application Relay TCP connections flexibility in implementing security policies Passes or rejects packets based on rules good for authentication and logging Permission granted by port address do not support user authentication of connections Hard to manage Not always transparent to No application level checking complex to configure Easy to make mistakes Used for email, FTP , TELNET, WWW Can understand what is carried in the packet. cannot prevent application-layer attacks
  • 19. NETWORK SECURITY DEVICES • Personal software firewalls • Improved their functionality: — Most personal software firewalls today also filter outbound traffic as well as inbound traffic. — Protects users by preventing malware from connecting to other computers and spreading. • Disadvantage: It is only as strong as the operating system of the computer.
  • 20.
  • 21. NETWORK SECURITY DEVICES • Hardware firewalls  Run their own OS  Usually located outside the network security perimeter as first line of defense  Disadvantage: Can be expensive
  • 22.
  • 23. CISCO ASA In computer networking, Cisco ASA 5500 Series Adaptive Security Appliances, or simply Cisco ASA, is Cisc’s line of network security devices introduced in May 2005. Cisco ASA has become one of the most widely used firewall/VPN solutions for small to medium businesses. Early reviews indicated the Cisco GUI tools for managing the device were lacking.
  • 24. “A firewall cant stop an idea” BaDBoY-ALbania
  • 25. QUESTIONS : Q1: What is firewall ? Q2: List the types of firewall ? Q3: what is alternate name of Application level gateway?
  • 26. Thank you for listening to our presentation