SlideShare a Scribd company logo
1 of 13
Firewall

     The Shield for computer network


Nikhil Dagale
What is firewall?


                    It is a technological barrier
                    designed to prevent unauthorized
                    or unwanted communications
                    between computer networks or
                    hosts
Hardware vs. Software Firewalls
• Hardware Firewalls
  – Protect an entire network
  – Implemented on the router level
  – Usually more expensive, harder to configure
• Software Firewalls
  – Protect a single computer
  – Usually less expensive, easier to configure
How does a software firewall work?

• Inspects each individual “packet” of data as it
  arrives at either side of the firewall
• Inbound to or outbound from your computer
• Determines whether it should be allowed to
  pass through or if it should be blocked
Firewall Rules
• Allow – traffic that flows automatically
  because it has been deemed as “safe” (Ex.
  Meeting Maker, Eudora, etc.)
• Block – traffic that is blocked because it has
  been deemed dangerous to your computer
• Ask – asks the user whether or not the traffic
  is allowed to pass through
What a personal firewall can do
•   Stop hackers from accessing your computer
•   Protects your personal information
•   Blocks “pop up” ads and certain cookies
•   Determines which programs can access the
    Internet
What a personal firewall cannot do

• Cannot prevent e-mail viruses
   – Only an antivirus product with updated definitions
     can prevent e-mail viruses
• After setting it initially, you can forget about it
   – The firewall will require periodic updates to the
     rulesets and the software itself
Examples of personal firewall software
 ZoneAlarm <www.zonelabs.com>
 BlackICE Defender <http://blackice.iss.net>
 Tiny Personal Firewall <www.tinysoftware.com>
 Norton Personal Firewall <www.symantec.com>

***Please be sure to read the license agreement
  carefully to verify that the firewall can be legally used
  at home and/or the office.
Windows XP Firewall
•   Currently *not* enabled by default
•   Enable under Start -> Settings -> Control Panel
•   Select Local Area Connection
•   Select the Properties button
•   Click the “Advanced” tab
Windows XP firewall
Thank you

More Related Content

What's hot

All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshellHishan Shouketh
 
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksSam Bowne
 
How network management system work
How network management system workHow network management system work
How network management system works1180075
 
Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.Webroot
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of SystemsJamal Jamali
 
Noorhidayu Yussof (Presentation 3)
Noorhidayu Yussof (Presentation 3)Noorhidayu Yussof (Presentation 3)
Noorhidayu Yussof (Presentation 3)Noorhidayu Yussof
 
Software Vendor (Norton Anti-Virus)
Software Vendor (Norton Anti-Virus)Software Vendor (Norton Anti-Virus)
Software Vendor (Norton Anti-Virus)John Joseph San Juan
 
Lecture 2 using an operating system
Lecture 2   using an operating systemLecture 2   using an operating system
Lecture 2 using an operating systemMaxwell Musonda
 
DESMI remote access internet uplink
DESMI remote access internet uplink DESMI remote access internet uplink
DESMI remote access internet uplink AndreAndrzejSzadzins
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityPrecisely
 

What's hot (17)

fire walls
fire wallsfire walls
fire walls
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Prew14
Prew14Prew14
Prew14
 
Prew14
Prew14Prew14
Prew14
 
Week 12
Week 12Week 12
Week 12
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
 
Encryption
EncryptionEncryption
Encryption
 
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
 
How network management system work
How network management system workHow network management system work
How network management system work
 
Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
Noorhidayu Yussof (Presentation 3)
Noorhidayu Yussof (Presentation 3)Noorhidayu Yussof (Presentation 3)
Noorhidayu Yussof (Presentation 3)
 
Software Vendor (Norton Anti-Virus)
Software Vendor (Norton Anti-Virus)Software Vendor (Norton Anti-Virus)
Software Vendor (Norton Anti-Virus)
 
Lecture 2 using an operating system
Lecture 2   using an operating systemLecture 2   using an operating system
Lecture 2 using an operating system
 
DESMI remote access internet uplink
DESMI remote access internet uplink DESMI remote access internet uplink
DESMI remote access internet uplink
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network Security
 

Viewers also liked

Blu Ray Disc
Blu Ray DiscBlu Ray Disc
Blu Ray Discyopirates
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural networkDEEPASHRI HK
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications Ahmed_hashmi
 
Introduction to Go programming
Introduction to Go programmingIntroduction to Go programming
Introduction to Go programmingExotel
 

Viewers also liked (8)

Blu Ray(Ind)
Blu Ray(Ind)Blu Ray(Ind)
Blu Ray(Ind)
 
Blu Ray Disc
Blu Ray DiscBlu Ray Disc
Blu Ray Disc
 
Blue Ray Disk
Blue Ray DiskBlue Ray Disk
Blue Ray Disk
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural network
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications
 
Introduction to Go programming
Introduction to Go programmingIntroduction to Go programming
Introduction to Go programming
 

Similar to Firewall

201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptxLakshayYadav46
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security DefinitionPatten John
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...Pranav Gontalwar
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Can a firewall alone effectively block port scanning activity
Can a firewall alone effectively block port scanning activityCan a firewall alone effectively block port scanning activity
Can a firewall alone effectively block port scanning activitysameer farooq
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewallsDivya Jyoti
 
Firewall (2)
Firewall (2)Firewall (2)
Firewall (2)marghali
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinalmordannon
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Finalmordannon
 
Firewall &amp; packet filter new
Firewall &amp; packet filter newFirewall &amp; packet filter new
Firewall &amp; packet filter newKarnav Rana
 
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptxReshmaBV2
 

Similar to Firewall (20)

Firewalls
FirewallsFirewalls
Firewalls
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
Seminar
SeminarSeminar
Seminar
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Firewall intro
Firewall introFirewall intro
Firewall intro
 
Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
 
Firewalls
FirewallsFirewalls
Firewalls
 
Can a firewall alone effectively block port scanning activity
Can a firewall alone effectively block port scanning activityCan a firewall alone effectively block port scanning activity
Can a firewall alone effectively block port scanning activity
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Firewall (2)
Firewall (2)Firewall (2)
Firewall (2)
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
 
Firewall &amp; packet filter new
Firewall &amp; packet filter newFirewall &amp; packet filter new
Firewall &amp; packet filter new
 
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptx
 
Firewalls
FirewallsFirewalls
Firewalls
 

Firewall

  • 1. Firewall The Shield for computer network Nikhil Dagale
  • 2. What is firewall? It is a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts
  • 3.
  • 4.
  • 5. Hardware vs. Software Firewalls • Hardware Firewalls – Protect an entire network – Implemented on the router level – Usually more expensive, harder to configure • Software Firewalls – Protect a single computer – Usually less expensive, easier to configure
  • 6. How does a software firewall work? • Inspects each individual “packet” of data as it arrives at either side of the firewall • Inbound to or outbound from your computer • Determines whether it should be allowed to pass through or if it should be blocked
  • 7. Firewall Rules • Allow – traffic that flows automatically because it has been deemed as “safe” (Ex. Meeting Maker, Eudora, etc.) • Block – traffic that is blocked because it has been deemed dangerous to your computer • Ask – asks the user whether or not the traffic is allowed to pass through
  • 8. What a personal firewall can do • Stop hackers from accessing your computer • Protects your personal information • Blocks “pop up” ads and certain cookies • Determines which programs can access the Internet
  • 9. What a personal firewall cannot do • Cannot prevent e-mail viruses – Only an antivirus product with updated definitions can prevent e-mail viruses • After setting it initially, you can forget about it – The firewall will require periodic updates to the rulesets and the software itself
  • 10. Examples of personal firewall software  ZoneAlarm <www.zonelabs.com>  BlackICE Defender <http://blackice.iss.net>  Tiny Personal Firewall <www.tinysoftware.com>  Norton Personal Firewall <www.symantec.com> ***Please be sure to read the license agreement carefully to verify that the firewall can be legally used at home and/or the office.
  • 11. Windows XP Firewall • Currently *not* enabled by default • Enable under Start -> Settings -> Control Panel • Select Local Area Connection • Select the Properties button • Click the “Advanced” tab