SlideShare a Scribd company logo
1 of 16
Prepared by:Birat Jung Thapa
B.Sc Csit,1st sem
Firewall ,Its types and Working
A firewall is a type of cybersecurity tool used to filter traffic on a network.
 Firewalls can separate network nodes from external traffic sources, internal
traffic sources, or even specific applications. Firewalls can be software,
hardware, or cloud-based, with each type of firewall having unique pros and
cons.
The primary goal of a firewall is to block malicious traffic requests and data
packets while letting through legitimate traffic.
What is a Firewall?
Types of Firewalls and Deployment Architectures :
You can divide firewall types into several categories based on
their general structure and method of operation. Here are the
five types of firewalls and their three modes of deployment.
Firewall Types:
Packet-filtering firewalls
Circuit-level gateways
Stateful inspection firewalls
Application-level gateways (a.k.a. proxy firewalls)
Next-gen firewalls
Firewall Delivery Methods:
Software firewalls
Hardware firewalls
Cloud firewalls
Packet-Filtering Firewalls :
 It’s the most basic and oldest type of firewall architecture, packet-filtering firewalls
create a checkpoint at a traffic router or switch.
The firewall performs a simple check of the data packets coming through the
router—inspecting information such as the destination and origination IP address,
packet type, port number, and other surface-level details without opening the packet
to examine its contents.
It then drops the packet if the information packet doesn’t pass the inspection.
Fig: Packet filter firewall topology
 Circuit-Level Gateways:
 Circuit-level gateways are another simplistic firewall type meant to quickly and
easily approve or deny traffic without consuming significant computing resources.
Circuit-level gateways work by verifying the transmission control protocol (TCP)
handshake.
This TCP handshake check is designed to ensure that the session the packet is
from is legitimate.
While extremely resource-efficient, these firewalls do not check the packet itself.
 So, if a packet held malware but had the proper TCP handshake, it would easily
pass through. Vulnerabilities like this are why circuit-level gateways are not
enough to protect your business by themselves.
Fig: Circuit level gateway
Stateful Inspection Firewalls :
This firewall type combines packet inspection technology and TCP handshake
verification to create a more significant level of protection than either of the two
architectures could provide alone.
•However, these firewalls also put more of a strain on computing resources.
• This may slow down the transfer of legitimate packets compared to the other
solutions.
fig: Stateful Inspection
Firewalls
Proxy Firewalls (Application-Level Gateways/Cloud Firewalls):
Proxy firewalls operate at the application layer to filter incoming traffic between
your network and the traffic source—hence, the name “application-level gateway.”
•These firewalls are delivered via a cloud-based solution or another proxy device.
Rather than letting traffic connect directly, the proxy firewall first establishes a
connection to the source of the traffic and inspects the incoming data packet.
•This check is similar to the stateful inspection firewall in looking at both the packet
and the TCP handshake protocol.
 However, proxy firewalls may also perform deep-layer packet inspections,
checking the actual contents of the information packet to verify that it contains no
malware.
Fig: Proxy Firewalls (Application-Level Gateways/Cloud
Firewalls)
Next-Generation Firewalls:
Many of the most recently-released firewall products are touted as “next-
generation” architectures. However, there is no consensus on what makes a firewall
genuinely next-gen.
Some typical features of next-generation firewall architectures include deep-packet
inspection (checking the actual contents of the data packet), TCP handshake
checks, and surface-level packet inspection.
Next-generation firewalls may consist of other technologies, such as intrusion
prevention systems (IPSs), that automatically stop attacks against your network.
Firewall Deployment Architecture :
Software Firewalls:
Software firewalls include any type of firewall that is installed
on a local device rather than a separate piece of hardware (or a
cloud server).
The big benefit of a software firewall is that it's highly useful
for creating defense in depth by isolating individual network
endpoints from one another.
Fig: Software
Firewalls
Hardware firewalls use a physical appliance that acts like a traffic router to intercept
data packets and traffic requests before they're connected to the network's servers.
Physical appliance-based firewalls like this excel at perimeter security by ensuring
malicious traffic from outside the network are intercepted before the company's
network endpoints are exposed to risk.
However, the major weakness of a hardware-based firewall is that it is often easy for
insider attacks to bypass them.
Hardware Firewalls :
Hardware Firewalls
Fig: Hardware Firewalls
Cloud Firewalls :
Whenever you use a cloud solution to deliver a firewall, it can be called a cloud
firewall or firewall-as-a-service (FaaS).
Many consider cloud firewalls synonymous with proxy firewalls since a cloud
server is often used in a firewall setup (though the proxy doesn't necessarily have to
be on the cloud, it frequently is).
The primary benefit of having cloud-based firewalls is that they are straightforward
to scale with your organization.
 As your needs grow, you can add additional capacity to the cloud server to filter
larger traffic loads.
.
Fig :Cloud Firewalls
How does a Firewall Work?
A firewall determines which internet traffic is trustworthy enough to pass
through it and which traffic is not. But just before diving into more detail, we must
first comprehend how a firewall performs to filter among web-based networks.
Firewall rules are designed to safeguard secure connections and the endpoint
gadgets that make up those networks. Hosts are electronic devices that can
interact with other hosts through some kind of network. They communicate both
inbound and outbound between internal networks as well as with external
networks.
Fig: Working of firewall
Thank you

More Related Content

Similar to Firewall ,Its types and Working.pptx (20)

Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
What is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxWhat is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptx
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Computer network 6
Computer network 6Computer network 6
Computer network 6
 

Recently uploaded

social media chat application main ppt.pptx
social media chat application main ppt.pptxsocial media chat application main ppt.pptx
social media chat application main ppt.pptxsprasad829829
 
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 AvilableCall Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilabledollysharma2066
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxShubham Rawat
 
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...ur8mqw8e
 
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ EscortsDelhi Escorts Service
 
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfBreath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfJess Walker
 
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭o8wvnojp
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)oannq
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan
 
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改atducpo
 
E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxJackieSparrow3
 
Dhule Call Girls #9907093804 Contact Number Escorts Service Dhule
Dhule Call Girls #9907093804 Contact Number Escorts Service DhuleDhule Call Girls #9907093804 Contact Number Escorts Service Dhule
Dhule Call Girls #9907093804 Contact Number Escorts Service Dhulesrsj9000
 
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfREFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfssusere8ea60
 
Call Girls In Dwarka Sub City ☎️7838079806 ✅ 💯Call Girls In Delhi
Call Girls In Dwarka Sub City  ☎️7838079806 ✅ 💯Call Girls In DelhiCall Girls In Dwarka Sub City  ☎️7838079806 ✅ 💯Call Girls In Delhi
Call Girls In Dwarka Sub City ☎️7838079806 ✅ 💯Call Girls In DelhiSoniyaSingh
 
西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做j5bzwet6
 

Recently uploaded (20)

social media chat application main ppt.pptx
social media chat application main ppt.pptxsocial media chat application main ppt.pptx
social media chat application main ppt.pptx
 
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 AvilableCall Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptx
 
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
 
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
 
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfBreath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
 
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Kalyan Vihar Delhi 💯 Call Us 🔝8264348440🔝
 
办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
 
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road GurgaonCheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
 
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
 
E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptx
 
Dhule Call Girls #9907093804 Contact Number Escorts Service Dhule
Dhule Call Girls #9907093804 Contact Number Escorts Service DhuleDhule Call Girls #9907093804 Contact Number Escorts Service Dhule
Dhule Call Girls #9907093804 Contact Number Escorts Service Dhule
 
young Call girls in Neb Sarai 🔝 9953056974 🔝 Delhi escort Service
young Call girls in Neb Sarai 🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Neb Sarai 🔝 9953056974 🔝 Delhi escort Service
young Call girls in Neb Sarai 🔝 9953056974 🔝 Delhi escort Service
 
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfREFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
 
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
 
Call Girls In Dwarka Sub City ☎️7838079806 ✅ 💯Call Girls In Delhi
Call Girls In Dwarka Sub City  ☎️7838079806 ✅ 💯Call Girls In DelhiCall Girls In Dwarka Sub City  ☎️7838079806 ✅ 💯Call Girls In Delhi
Call Girls In Dwarka Sub City ☎️7838079806 ✅ 💯Call Girls In Delhi
 
🔝9953056974🔝!!-YOUNG BOOK model Call Girls In Aerocity Delhi Escort service
🔝9953056974🔝!!-YOUNG BOOK model Call Girls In Aerocity Delhi Escort service🔝9953056974🔝!!-YOUNG BOOK model Call Girls In Aerocity Delhi Escort service
🔝9953056974🔝!!-YOUNG BOOK model Call Girls In Aerocity Delhi Escort service
 
西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做
 

Firewall ,Its types and Working.pptx

  • 1. Prepared by:Birat Jung Thapa B.Sc Csit,1st sem Firewall ,Its types and Working
  • 2. A firewall is a type of cybersecurity tool used to filter traffic on a network.  Firewalls can separate network nodes from external traffic sources, internal traffic sources, or even specific applications. Firewalls can be software, hardware, or cloud-based, with each type of firewall having unique pros and cons. The primary goal of a firewall is to block malicious traffic requests and data packets while letting through legitimate traffic. What is a Firewall?
  • 3. Types of Firewalls and Deployment Architectures : You can divide firewall types into several categories based on their general structure and method of operation. Here are the five types of firewalls and their three modes of deployment. Firewall Types: Packet-filtering firewalls Circuit-level gateways Stateful inspection firewalls Application-level gateways (a.k.a. proxy firewalls) Next-gen firewalls Firewall Delivery Methods: Software firewalls Hardware firewalls Cloud firewalls
  • 4. Packet-Filtering Firewalls :  It’s the most basic and oldest type of firewall architecture, packet-filtering firewalls create a checkpoint at a traffic router or switch. The firewall performs a simple check of the data packets coming through the router—inspecting information such as the destination and origination IP address, packet type, port number, and other surface-level details without opening the packet to examine its contents. It then drops the packet if the information packet doesn’t pass the inspection. Fig: Packet filter firewall topology
  • 5.  Circuit-Level Gateways:  Circuit-level gateways are another simplistic firewall type meant to quickly and easily approve or deny traffic without consuming significant computing resources. Circuit-level gateways work by verifying the transmission control protocol (TCP) handshake. This TCP handshake check is designed to ensure that the session the packet is from is legitimate. While extremely resource-efficient, these firewalls do not check the packet itself.  So, if a packet held malware but had the proper TCP handshake, it would easily pass through. Vulnerabilities like this are why circuit-level gateways are not enough to protect your business by themselves.
  • 7. Stateful Inspection Firewalls : This firewall type combines packet inspection technology and TCP handshake verification to create a more significant level of protection than either of the two architectures could provide alone. •However, these firewalls also put more of a strain on computing resources. • This may slow down the transfer of legitimate packets compared to the other solutions. fig: Stateful Inspection Firewalls
  • 8. Proxy Firewalls (Application-Level Gateways/Cloud Firewalls): Proxy firewalls operate at the application layer to filter incoming traffic between your network and the traffic source—hence, the name “application-level gateway.” •These firewalls are delivered via a cloud-based solution or another proxy device. Rather than letting traffic connect directly, the proxy firewall first establishes a connection to the source of the traffic and inspects the incoming data packet. •This check is similar to the stateful inspection firewall in looking at both the packet and the TCP handshake protocol.  However, proxy firewalls may also perform deep-layer packet inspections, checking the actual contents of the information packet to verify that it contains no malware. Fig: Proxy Firewalls (Application-Level Gateways/Cloud Firewalls)
  • 9. Next-Generation Firewalls: Many of the most recently-released firewall products are touted as “next- generation” architectures. However, there is no consensus on what makes a firewall genuinely next-gen. Some typical features of next-generation firewall architectures include deep-packet inspection (checking the actual contents of the data packet), TCP handshake checks, and surface-level packet inspection. Next-generation firewalls may consist of other technologies, such as intrusion prevention systems (IPSs), that automatically stop attacks against your network.
  • 10. Firewall Deployment Architecture : Software Firewalls: Software firewalls include any type of firewall that is installed on a local device rather than a separate piece of hardware (or a cloud server). The big benefit of a software firewall is that it's highly useful for creating defense in depth by isolating individual network endpoints from one another. Fig: Software Firewalls
  • 11. Hardware firewalls use a physical appliance that acts like a traffic router to intercept data packets and traffic requests before they're connected to the network's servers. Physical appliance-based firewalls like this excel at perimeter security by ensuring malicious traffic from outside the network are intercepted before the company's network endpoints are exposed to risk. However, the major weakness of a hardware-based firewall is that it is often easy for insider attacks to bypass them. Hardware Firewalls :
  • 13. Cloud Firewalls : Whenever you use a cloud solution to deliver a firewall, it can be called a cloud firewall or firewall-as-a-service (FaaS). Many consider cloud firewalls synonymous with proxy firewalls since a cloud server is often used in a firewall setup (though the proxy doesn't necessarily have to be on the cloud, it frequently is). The primary benefit of having cloud-based firewalls is that they are straightforward to scale with your organization.  As your needs grow, you can add additional capacity to the cloud server to filter larger traffic loads.
  • 15. How does a Firewall Work? A firewall determines which internet traffic is trustworthy enough to pass through it and which traffic is not. But just before diving into more detail, we must first comprehend how a firewall performs to filter among web-based networks. Firewall rules are designed to safeguard secure connections and the endpoint gadgets that make up those networks. Hosts are electronic devices that can interact with other hosts through some kind of network. They communicate both inbound and outbound between internal networks as well as with external networks. Fig: Working of firewall