Firewall presentation

43,260 views

Published on

1 Comment
54 Likes
Statistics
Notes
No Downloads
Views
Total views
43,260
On SlideShare
0
From Embeds
0
Number of Embeds
37
Actions
Shares
0
Downloads
3,530
Comments
1
Likes
54
Embeds 0
No embeds

No notes for slide

Firewall presentation

  1. 1. Presentation :’Firewalls’<br />Presenters :-Gagandeep Singh<br />KarandeepVohra<br />Puneetpal Singh<br />1<br />
  2. 2. Table of Contents<br />2<br />Introduction<br />HOW FIREWALL WORKS<br />Types of Firewalls <br />MAKING THE FIREWALL FIT<br />TESTING A FIREWALL CONFIGURATION<br />CONCLUSION<br />REFERENCES<br />
  3. 3. Introduction<br />Is hardware, software, or a combination of both<br />used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer.<br />3<br />
  4. 4. Hardware vs. Software Firewalls<br />4<br />Hardware Firewalls<br />Protect an entire network<br />Implemented on the router level<br />Usually more expensive, harder to configure<br />Software Firewalls<br />Protect a single computer<br />Usually less expensive, easier to configure<br />
  5. 5. How does a software firewall work?<br />5<br />Inspects each individual “packet” of data as it arrives at either side of the firewall<br />Determines whether it should be allowed to pass through or if it should be blocked<br />
  6. 6. Firewall Rules<br />6<br />Allow – traffic that flows automatically because it has been deemed<br />Block – traffic that is blocked because it has been deemed dangerous to your computer<br />Ask – asks the user whether or not the traffic is allowed to pass through<br />
  7. 7. What Can a Firewall Do?<br />Focus for security decisions<br />Stop hackers from accessing your computer<br />Can enforce security policy<br />Protects your personal information<br />Limits your exposure<br />Blocks “pop up” ads and certain cookies<br />Can log Internet activity efficiently<br />Determines which programs can access the Internet<br />7<br />
  8. 8. What Can't a Firewall Do?<br />Can't protect you against malicious insiders<br />Can't protect you against connections that don't go through it<br />Can't protect against completely new threats<br />Can't protect against viruses<br />8<br />
  9. 9. Types of Firewalls<br /> Packet Filtering Firewall<br />Application level Gateway<br />Circuit level gateway<br />9<br />
  10. 10. Architectures for Firewall <br />Single-Box Architecture<br />10<br />
  11. 11. Screened Host Architecture<br />11<br />
  12. 12. Making The Firewall Fit<br />IP address<br />Domain names<br />Protocols<br />Ports<br />12<br />
  13. 13. What It Protects You From<br />Remote login <br />SMTP session hijacking <br />Operating system bugs <br />Spam<br />E-mail bombs <br />Source routing <br />13<br />
  14. 14. Security Strategies implemented <br />Default Deny<br />Prohibit all communication that is not expressly permitted<br />Default Permit<br />Permit all communication that is not explicitly prohibited<br />Least Privilege<br />reduces the authorization level at which various actions are performed<br />Defense in Depth<br />security approach whereby each system on the network is secured to the greatest possible degree<br />Choke Point<br />forces attackers to use a narrow channel to bypass the network<br />14<br />
  15. 15. Testing a Firewall Configuration<br />15<br /><ul><li>A faster and easier method is available with the Linux firewall </li></ul> implementation<br /><ul><li> Allows you to manually generate tests
  16. 16. Suppose our local network is 172.16.1.0
  17. 17. And we allow only TCP connections </li></li></ul><li>Example<br />16<br /># ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0accepted<br /># ipchains -C forward -p tcp -s 172.16.2.0 1025 -d 44.136.8.2 80 -i eth0denied<br /># ipchains -C forward -p udp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0denied<br /># ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 23 -i eth0denied <br />source<br />Destination<br />Wrong<br />Wrong<br />Wrong<br />
  18. 18. REFRENCES<br />17<br />www.howstuffworks.com<br /> <br />www.securityfocus.com <br />www.firewall.com<br />
  19. 19. 18<br />Conclusion<br />
  20. 20. Testing a Firewall Configuration<br />THANKU<br />19<br />

×