SlideShare a Scribd company logo
1 of 19
PRESENTERS :-
GAGANDEEP SINGH
KARANDEEP VOHRA
PUNEETPAL SINGH
Presentation :’Firewalls’
1
Table of Contents
2
 INTRODUCTION
 HOW FIREWALL WORKS
 TYPES OF FIREWALLS
 MAKING THE FIREWALL FIT
 TESTING A FIREWALL CONFIGURATION
 CONCLUSION
 REFERENCES
Introduction
 Is hardware, software, or a combination of both
 used to prevent unauthorized programs or Internet
users from accessing a private network and/or a
single computer.
3
Hardware vs. Software Firewalls
4
 Hardware Firewalls
 Protect an entire network
 Implemented on the router level
 Usually more expensive, harder to configure
 Software Firewalls
 Protect a single computer
 Usually less expensive, easier to configure
How does a software firewall work?
5
 Inspects each individual “packet” of data as it arrives
at either side of the firewall
 Determines whether it should be allowed to pass
through or if it should be blocked
Firewall Rules
6
 Allow – traffic that flows automatically because it
has been deemed
 Block – traffic that is blocked because it has been
deemed dangerous to your computer
 Ask – asks the user whether or not the traffic is
allowed to pass through
What Can a Firewall Do?
 Focus for security decisions
 Stop hackers from accessing your computer
 Can enforce security policy
 Protects your personal information
 Limits your exposure
 Blocks “pop up” ads and certain cookies
 Can log Internet activity efficiently
 Determines which programs can access the Internet
7
What Can't a Firewall Do?
 Can't protect you against malicious insiders
 Can't protect you against connections that don't go
through it
 Can't protect against completely new threats
 Can't protect against viruses
8
Types of Firewalls
 Packet Filtering Firewall
 Application level Gateway
 Circuit level gateway
9
Architectures for Firewall
 Single-Box Architecture
10
Screened Host Architecture
11
Making The Firewall Fit
 IP address
 Domain names
 Protocols
 Ports
12
What It Protects You From
 Remote login
 SMTP session hijacking
 Operating system bugs
 Spam
 E-mail bombs
 Source routing
13
Security Strategies implemented
 Default Deny
 Prohibit all communication that is not expressly permitted
 Default Permit
 Permit all communication that is not explicitly prohibited
 Least Privilege
 reduces the authorization level at which various actions are
performed
 Defense in Depth
 security approach whereby each system on the network is secured
to the greatest possible degree
 Choke Point
 forces attackers to use a narrow channel to bypass the network
14
Testing a Firewall Configuration
15
• A faster and easier method is available with the
Linux firewall
 implementation
• Allows you to manually generate tests
• Suppose our local network is 172.16.1.0
• And we allow only TCP connections
Example
16

# ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0
accepted
 # ipchains -C forward -p tcp -s 172.16.2.0 1025 -d 44.136.8.2 80 -i eth0
denied
 # ipchains -C forward -p udp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0
denied
 # ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 23 -i eth0
denied
source Destination
Wrong
Wrong
Wrong
REFRENCES
17
 www.howstuffworks.com
 www.securityfocus.com
 www.firewall.com
18
Conclusion
TESTING A FIREWALL CONFIGURATION
THANKU
19

More Related Content

What's hot

FireWall
FireWallFireWall
FireWall
rubal_9
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
Thang Man
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
emin_oz
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
Sapna Kumari
 

What's hot (19)

Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
FireWall
FireWallFireWall
FireWall
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
 
firewall
firewallfirewall
firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
 
Snort Intrusion Detection / Prevention System on PFSense Firewall
Snort Intrusion Detection / Prevention System  on PFSense FirewallSnort Intrusion Detection / Prevention System  on PFSense Firewall
Snort Intrusion Detection / Prevention System on PFSense Firewall
 
Firewall
FirewallFirewall
Firewall
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Firewall intro
Firewall introFirewall intro
Firewall intro
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 

Viewers also liked

Tejas Nandedkar Resume (1)
Tejas Nandedkar Resume (1)Tejas Nandedkar Resume (1)
Tejas Nandedkar Resume (1)
Tejas Nandedkar
 
46584071 exercise-chapter-1-form-4 (1)
46584071 exercise-chapter-1-form-4 (1)46584071 exercise-chapter-1-form-4 (1)
46584071 exercise-chapter-1-form-4 (1)
Monie Joey
 

Viewers also liked (13)

KVR CV- 28 Oct 15
KVR CV- 28 Oct 15KVR CV- 28 Oct 15
KVR CV- 28 Oct 15
 
«Оставайтесь на линии...» или чем заняты менеджеры
«Оставайтесь на линии...» или чем заняты менеджеры«Оставайтесь на линии...» или чем заняты менеджеры
«Оставайтесь на линии...» или чем заняты менеджеры
 
Tejas Nandedkar Resume (1)
Tejas Nandedkar Resume (1)Tejas Nandedkar Resume (1)
Tejas Nandedkar Resume (1)
 
Instrumentación quirúrgica maga profe
Instrumentación quirúrgica maga profeInstrumentación quirúrgica maga profe
Instrumentación quirúrgica maga profe
 
JPCV
JPCVJPCV
JPCV
 
запровадження програм розвитку життєвих навичок в школі
запровадження програм розвитку життєвих навичок в школі запровадження програм розвитку життєвих навичок в школі
запровадження програм розвитку життєвих навичок в школі
 
Olimpo alvarez beltran 2
Olimpo alvarez beltran 2Olimpo alvarez beltran 2
Olimpo alvarez beltran 2
 
Ch. 10 with jose ovu nov. 2015 sped 401
Ch. 10 with jose ovu nov. 2015 sped 401 Ch. 10 with jose ovu nov. 2015 sped 401
Ch. 10 with jose ovu nov. 2015 sped 401
 
Caso Real
Caso RealCaso Real
Caso Real
 
Tejas nandedkar resume (1)
Tejas nandedkar resume (1)Tejas nandedkar resume (1)
Tejas nandedkar resume (1)
 
Mitología griega
Mitología griega Mitología griega
Mitología griega
 
idoling_approval_desire
idoling_approval_desireidoling_approval_desire
idoling_approval_desire
 
46584071 exercise-chapter-1-form-4 (1)
46584071 exercise-chapter-1-form-4 (1)46584071 exercise-chapter-1-form-4 (1)
46584071 exercise-chapter-1-form-4 (1)
 

Similar to Firewallpresentation 100826052003-phpapp02

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
Prabhdeep Kaur
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
Pranav Gontalwar
 

Similar to Firewallpresentation 100826052003-phpapp02 (20)

Linta
LintaLinta
Linta
 
firewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxfirewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptx
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
 
Firewall
FirewallFirewall
Firewall
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Firewalls-Intro
Firewalls-IntroFirewalls-Intro
Firewalls-Intro
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Net Defender
Net DefenderNet Defender
Net Defender
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Day4
Day4Day4
Day4
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Firewallpresentation 100826052003-phpapp02

  • 1. PRESENTERS :- GAGANDEEP SINGH KARANDEEP VOHRA PUNEETPAL SINGH Presentation :’Firewalls’ 1
  • 2. Table of Contents 2  INTRODUCTION  HOW FIREWALL WORKS  TYPES OF FIREWALLS  MAKING THE FIREWALL FIT  TESTING A FIREWALL CONFIGURATION  CONCLUSION  REFERENCES
  • 3. Introduction  Is hardware, software, or a combination of both  used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. 3
  • 4. Hardware vs. Software Firewalls 4  Hardware Firewalls  Protect an entire network  Implemented on the router level  Usually more expensive, harder to configure  Software Firewalls  Protect a single computer  Usually less expensive, easier to configure
  • 5. How does a software firewall work? 5  Inspects each individual “packet” of data as it arrives at either side of the firewall  Determines whether it should be allowed to pass through or if it should be blocked
  • 6. Firewall Rules 6  Allow – traffic that flows automatically because it has been deemed  Block – traffic that is blocked because it has been deemed dangerous to your computer  Ask – asks the user whether or not the traffic is allowed to pass through
  • 7. What Can a Firewall Do?  Focus for security decisions  Stop hackers from accessing your computer  Can enforce security policy  Protects your personal information  Limits your exposure  Blocks “pop up” ads and certain cookies  Can log Internet activity efficiently  Determines which programs can access the Internet 7
  • 8. What Can't a Firewall Do?  Can't protect you against malicious insiders  Can't protect you against connections that don't go through it  Can't protect against completely new threats  Can't protect against viruses 8
  • 9. Types of Firewalls  Packet Filtering Firewall  Application level Gateway  Circuit level gateway 9
  • 10. Architectures for Firewall  Single-Box Architecture 10
  • 12. Making The Firewall Fit  IP address  Domain names  Protocols  Ports 12
  • 13. What It Protects You From  Remote login  SMTP session hijacking  Operating system bugs  Spam  E-mail bombs  Source routing 13
  • 14. Security Strategies implemented  Default Deny  Prohibit all communication that is not expressly permitted  Default Permit  Permit all communication that is not explicitly prohibited  Least Privilege  reduces the authorization level at which various actions are performed  Defense in Depth  security approach whereby each system on the network is secured to the greatest possible degree  Choke Point  forces attackers to use a narrow channel to bypass the network 14
  • 15. Testing a Firewall Configuration 15 • A faster and easier method is available with the Linux firewall  implementation • Allows you to manually generate tests • Suppose our local network is 172.16.1.0 • And we allow only TCP connections
  • 16. Example 16  # ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0 accepted  # ipchains -C forward -p tcp -s 172.16.2.0 1025 -d 44.136.8.2 80 -i eth0 denied  # ipchains -C forward -p udp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0 denied  # ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 23 -i eth0 denied source Destination Wrong Wrong Wrong
  • 19. TESTING A FIREWALL CONFIGURATION THANKU 19