SlideShare a Scribd company logo
1 of 5
Download to read offline
Page 1 of 5
A firewall is a network security device, either hardware or software-based, which monitors all incoming and outgoing traffic and
based on a defined set of security rules it accepts, rejects or drops that specific traffic.
Accept : allow the traffic
Reject : block the traffic but reply with an “unreachable error”
Drop : block the traffic with no reply
A firewall establishes a barrier between secured internal networks and outside untrusted network, such as the Internet.
Before Firewalls, network security was performed by Access Control Lists (ACLs) residing on routers. ACLs are rules that determine
whether network access should be granted or denied to specific IP address.
But ACLs cannot determine the nature of the packet it is blocking. Also, ACL alone does not have the capacity to keep threats out
of the network. Hence, the Firewall was introduced.
Connectivity to the Internet is no longer optional for organizations. However, accessing the Internet provides benefits to the
organization; it also enables the outside world to interact with the internal network of the organization. This creates a threat to the
organization. In order to secure the internal network from unauthorized traffic, we need a Firewall.
Firewall match the network traffic against the rule set defined in its table. Once the rule is matched, associate action is applied to
the network traffic. For example, Rules are defined as any employee from HR department cannot access the data from code server
and at the same time another rule is defined like system administrator can access the data from both HR and technical
department. Rules can be defined on the firewall based on the necessity and security policies of the organization.
From the perspective of a server, network traffic can be either outgoing or incoming. Firewall maintains a distinct set of rules for
both the cases. Mostly the outgoing traffic, originated from the server itself, allowed to pass. Still, setting a rule on outgoing traffic
is always better in order to achieve more security and prevent unwanted communication.
Incoming traffic is treated differently. Most traffic which reaches on the firewall is one of these three major Transport Layer
protocols- TCP, UDP or ICMP. All these types have a source address and destination address. Also, TCP and UDP have port
numbers. ICMP uses type code instead of port number which identifies purpose of that packet.
Default policy: It is very difficult to explicitly cover every possible rule on the firewall. For this reason, the firewall must always
have a default policy. Default policy only consists of action (accept, reject or drop).
Suppose no rule is defined about SSH connection to the server on the firewall. So, it will follow the default policy. If default policy
on the firewall is set to accept, then any computer outside of your office can establish an SSH connection to the server. Therefore,
setting default policy as drop (or reject) is always a good practice.
Firewalls can be categorized based on its generation.
1. First Generation- Packet Filtering Firewall : Packet filtering firewall is used to control network access by
monitoring outgoing and incoming packet and allowing them to pass or stop based on source and destination IP address,
protocols and ports. It analyses traffic at the transport protocol layer (but mainly uses first 3 layers).
Packet firewalls treat each packet in isolation. They have no ability to tell whether a packet is part of an existing stream of
traffic. Only It can allow or deny the packets based on unique packet headers.
Packet filtering firewall maintains a filtering table which decides whether the packet will be forwarded or discarded. From the
given filtering table, the packets will be Filtered according to following rules:
Page 2 of 5
1. Incoming packets from network 192.168.21.0 are blocked.
2. Incoming packets destined for internal TELNET server (port 23) are blocked.
3. Incoming packets destined for host 192.168.21.3 are blocked.
4. All well-known services to the network 192.168.21.0 are allowed.
2. Second Generation- Stateful Inspection Firewall : Stateful firewalls (performs Stateful Packet Inspection) are able to
determine the connection state of packet, unlike Packet filtering firewall, which makes it more efficient. It keeps track of the
state of networks connection travelling across it, such as TCP streams. So the filtering decisions would not only be based on
defined rules, but also on packet’s history in the state table.
3. Third Generation- Application Layer Firewall : Application layer firewall can inspect and filter the packets on any OSI
layer, up to the application layer. It has the ability to block specific content, also recognize when certain application and
protocols (like HTTP, FTP) are being misused.
In other words, Application layer firewalls are hosts that run proxy servers. A proxy firewall prevents the direct connection
between either side of the firewall, each packet has to pass through the proxy. It can allow or block the traffic based on
predefined rules.
Note: Application layer firewalls can also be used as Network Address Translator(NAT).
4. Next Generation Firewalls (NGFW) : Next Generation Firewalls are being deployed these days to stop modern security
breaches like advance malware attacks and application-layer attacks. NGFW consists of Deep Packet Inspection, Application
Inspection, SSL/SSH inspection and many functionalities to protect the network from these modern threats.
Firewalls are generally of two types: Host-based and Network-based.
1. Host- based Firewalls : Host-based firewall is installed on each network node which controls each incoming and outgoing
packet. It is a software application or suite of applications, comes as a part of the operating system. Host-based firewalls are
needed because network firewalls cannot provide protection inside a trusted network. Host firewall protects each host from
attacks and unauthorized access.
2. Network-based Firewalls : Network firewall function on network level. In other words, these firewalls filter all incoming and
outgoing traffic across the network. It protects the internal network by filtering the traffic using rules defined on the firewall. A
Network firewall might have two or more network interface cards (NICs). A network-based firewall is usually a dedicated
system with proprietary software installed.
A firewall is a network security system which monitors and takes actions on the ingoing or outgoing packets based on the defined
rules. It can be a hardware device or a software.
An organisation that cannot afford a hardware firewall device uses an alternative i.e implementing firewall features on Cisco IOS
router by using CBAC or by using Zone-based firewall.CBAC is a predecessor to Zone-based firewall.
Zone-based Firewall –
A Zone-based firewall is an advanced method of stateful firewall. In stateful firewall, a stateful database is maintained in which
source IP address, destination IP address, source Port number, destination port number is recorded. Due to this, only the replies
are allowed i.e if the traffic is Generated from inside the network then only the replies (of inside network traffic) coming from
outside the network is allowed.
Cisco IOS router can be made firewall through two methods:
1. By using CBAC: create an access-list and apply it to the interfaces keeping in mind what traffic should be allowed or denied
and in what direction. This has an extra overhead for the administrator.
2. Using a Zone-based firewall.
Terms:
1. Zone – A zone is a logical area in which the devices having same trust levels resides. After creating a zone, an interface is
assigned to a zone.By default, traffic is not allowed from one zone to another.
Page 3 of 5
For example, first we create a zone called inside then if the router interface fa0/0 resides on the most trusted network which
we name as inside, then fa0/0 is assigned to inside zone.
2. Zone-pair – Policies are defined in which traffic is identified (what type of traffic) then what action should be taken (Inspect
Denied, permit). Then we have to apply this policies to a zone-pair. A zone-pair is always unidirectional. If we want to make it
bidirectional then we have to create another zone-pair.
For instance, we want to allow the traffic from inside to outside network then we have to create a zone-pair. If we have
chosen the action inspect then the reply is permitted from outside the network if the traffic is generated from the inside
network (stateful filtering).
Now, if we want to allow outside traffic to be able to reach inside network then we have to make a separate zone-pair. This
zone-pair will allow the traffic to reach the inside network if the traffic is generated from the outside network.
3. Self-zone – Traffic destined to the router itself, irrespective of which device has send, is known as self zone. The traffic
generated from router is known as traffic coming from self-zone. Traffic going to router is considered as traffic going to Self-
zone. By default, the traffic to or from the Self-zone is allowed however it can be changed according to the policies applied.
Working:
First, the zones are defined and named. Although, we can give any name but by naming convention that makes sense, name the
zones as inside, outside and DMZ.
 inside: The most trusted (private) network.
 outside: The most untrusted (public) network.
 DMZ: (public zone) contains devices like servers.
Now, as zones have been named, policies are created which will include what type of traffic is allowed to be generated and allowed
to go through from inside network to outside network and what actions (such as inspect [stateful inspection]) should be taken on
the traffic.
The actions can be:
 inspect: an entry will be made in stateful database for the protocols (for which the policies has been applied) so that the
replies (for inside network) can come back.
 drop: default action if the traffic does not match the policies.
 pass: the traffic will be allowed from one zone to another but no session is maintained.
The traffic which will not match the policies will be dropped due to default policy. This policies will be defined for one direction
(such as inside to outside) in a zone pair.
If conditions requires to allow initial traffic to be generated in both directions (inside to outside network and outside to inside
network), then two separate zone-pairs will be created and separate policies are applied.
Advantages – Some of the advantages are:
1. By default, the traffic is blocked unlike CBAC. In Zone-based firewall, no traffic is allowed from one zone to another while in
CBAC, all traffic is allowed if no explicit ACL is applied.
2. Unlike CBAC, Zone-based firewall is no heavily dependent on ACL.
3. It is easy to add another interface as only the zone has to be declared to which the interface belongs as all the policies will be
same as applied explicitly before for that zone.
Page 4 of 5
A firewall is a network security system which monitors and takes actions (permit or deny traffic) on the basis of policies defined
explicitly.It can be performed by a single device, group of devices or by software running on a single device like server.
Cisco ASA has the biggest share in the market while there are other vendors of firewall also like checkpoint, Juniper etc.
Firewall Methodologies –
There are certain methods through which firewall can be implemented. These are as follows:
1. Static packet filtering – Packet filtering is a firewall technique used to control access on the basis of source IP address,
destination IP address, source Port number and destination port number. It works on layer 3 and 4 of OSI model.Also, an ACL
doesn’t maintain the state of session. A router with ACL applied on it is an example of static packet filtering.
Advantages –
 If the administrator has a good knowledge of network, it is easy to implement.
 It can be configured on almost all routers.
 It has minimal effect on network performance.
Disadvantage –
 Large amount of ACLs are difficult to maintain.
 ACLs uses IP address for filtering. If someone spoofs the same source IP address then that will be allowed by ACL.
2. Stateful packet filtering –
In stateful packet filtering, the state of the sessions are maintained i.e when a session is initiated within a trusted network, it’s
source and destination IP address, source and destination ports and other layer information are recorded. By default, all the
traffic from untrusted network is denied.
The replies of this session will be allowed only when the IP addresses (source and destination IP address) and port numbers
(source and destination )are swapped.
Advantages –
 Dynamic in nature as compared to static packet filtering.
 Not susceptible to IP spoofing.
 Can be implemented on routers.
Disadvantage –
 Might not be able to prevent application layer attack.
 Some applications open dynamic ports on the server side, if the firewall is analysing this, it can cause application failure.
This is where application inspection comes into use.
3. Proxy firewalls –
These are also known as application layer firewalls. Proxy firewall acts as an intermediary between the original client and the
server. No direct connection takes place between the original client and the server.
The client, who has to establish a connection directly to the server to communicate with it, now have to establish a connection
with proxy server. The proxy server then establishes a connection with the server on the behalf of client. Now, the client sends
the data to the proxy server and proxy server forwards it to the server. Proxy server can operate upto layer 7 (application
layer).
Advantage –
 Difficult to attack server as proxy server is the intermediate between the client and the server.
 Can provide detailed logging.
 Can be implemented on common hardware.
Disadvantage –
 Processor intensive
 Memory and disk intensive
 Single point of failure in network security
4. Application inspection –
These can analyze the packet upto layer 7 (deep inspection) but can’t act as a proxy server. These can deeply analyze
conversation between a client and server even when the server is assigning a dynamic port to the client therfore it doesn’t fail
in these cases (which can occur in stateful firewall).
Advantages –
 Can analyze deeper into the conversation between the server and the client.
 If there is a protocol anamoly happening from standard then it can deny the packets.
5. Transparent firewall –
By default, the firewall operates at layer 3 but the benefit of using transparent firewall is that it can operate at layer 2.It has 2
Page 5 of 5
interfaces which will act like a bridge so can be configured through a single management IP address. Also, users accessing the
network will not even know about that a firewall exists.
The main advantage of using transparent firewall is that we don’t need to re-address our networks while putting up a firewall
in our network. Also, while operating at layer 2, it can still perform functions like building stateful database, application
inspection etc.
6. Network Address Translation (NAT) –
NAT is implemented on a router or firewall. NAT is used to translate private IP address into a public IP address through which
we can hide our source IP address.
And if we are using dynamic NAT or PAT, an attacker will not be able to know that what devices are dynamically assigned
which IP address from the pool. This makes difficult to make a connection from outside world to our private network.
7. Next-Generation Firewalls –
NGFWs are third generation security firewall that is implemented in either in software or device. It combines basic firewall
properties like static packet filtering, application inspection with advanced security features like integrated intrusion prevention
system. Cisco AAA with firePOWER services is an example of Next-Generation firewall.

More Related Content

Similar to A firewall is a network security device.

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
IOS Zone based Firewall
IOS Zone based FirewallIOS Zone based Firewall
IOS Zone based FirewallNetwax Lab
 
Computer network 6
Computer network 6Computer network 6
Computer network 6MDHASNAIN23
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptgocokir267
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfDr. Shivashankar
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.pptRaj Kumar
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].pptBachaSirata
 
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptxCSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptxVivekTripathi684438
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filtersMOHIT AGARWAL
 
Cryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdfCryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdfahmeddeath6
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxShreyaBanerjee52
 

Similar to A firewall is a network security device. (20)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
PT.pptx
PT.pptxPT.pptx
PT.pptx
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
IOS Zone based Firewall
IOS Zone based FirewallIOS Zone based Firewall
IOS Zone based Firewall
 
Ch20 book
Ch20 bookCh20 book
Ch20 book
 
Computer network 6
Computer network 6Computer network 6
Computer network 6
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptxCSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Cryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdfCryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdf
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewalls
FirewallsFirewalls
Firewalls
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 

Recently uploaded

Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikLow Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)kojalkojal131
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...anilsa9823
 
Lubrication and it's types and properties of the libricabt
Lubrication and it's types and properties of the libricabtLubrication and it's types and properties of the libricabt
Lubrication and it's types and properties of the libricabtdineshkumar430venkat
 
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...Pooja Nehwal
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Pooja Nehwal
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...Pooja Nehwal
 
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样qaffana
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...amitlee9823
 
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...amitlee9823
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Naicy mandal
 
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort GirlsDeira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort GirlsEscorts Call Girls
 
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikLow Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
 
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
 
Lubrication and it's types and properties of the libricabt
Lubrication and it's types and properties of the libricabtLubrication and it's types and properties of the libricabt
Lubrication and it's types and properties of the libricabt
 
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
 
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
 
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
 
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
 
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
 
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
 
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort GirlsDeira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
 
@Delhi ! CAll GIRLS IN Defence Colony 🦋 9999965857 🤩 Dwarka Call Girls
@Delhi ! CAll GIRLS IN Defence Colony 🦋 9999965857 🤩 Dwarka Call Girls@Delhi ! CAll GIRLS IN Defence Colony 🦋 9999965857 🤩 Dwarka Call Girls
@Delhi ! CAll GIRLS IN Defence Colony 🦋 9999965857 🤩 Dwarka Call Girls
 
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
 

A firewall is a network security device.

  • 1. Page 1 of 5 A firewall is a network security device, either hardware or software-based, which monitors all incoming and outgoing traffic and based on a defined set of security rules it accepts, rejects or drops that specific traffic. Accept : allow the traffic Reject : block the traffic but reply with an “unreachable error” Drop : block the traffic with no reply A firewall establishes a barrier between secured internal networks and outside untrusted network, such as the Internet. Before Firewalls, network security was performed by Access Control Lists (ACLs) residing on routers. ACLs are rules that determine whether network access should be granted or denied to specific IP address. But ACLs cannot determine the nature of the packet it is blocking. Also, ACL alone does not have the capacity to keep threats out of the network. Hence, the Firewall was introduced. Connectivity to the Internet is no longer optional for organizations. However, accessing the Internet provides benefits to the organization; it also enables the outside world to interact with the internal network of the organization. This creates a threat to the organization. In order to secure the internal network from unauthorized traffic, we need a Firewall. Firewall match the network traffic against the rule set defined in its table. Once the rule is matched, associate action is applied to the network traffic. For example, Rules are defined as any employee from HR department cannot access the data from code server and at the same time another rule is defined like system administrator can access the data from both HR and technical department. Rules can be defined on the firewall based on the necessity and security policies of the organization. From the perspective of a server, network traffic can be either outgoing or incoming. Firewall maintains a distinct set of rules for both the cases. Mostly the outgoing traffic, originated from the server itself, allowed to pass. Still, setting a rule on outgoing traffic is always better in order to achieve more security and prevent unwanted communication. Incoming traffic is treated differently. Most traffic which reaches on the firewall is one of these three major Transport Layer protocols- TCP, UDP or ICMP. All these types have a source address and destination address. Also, TCP and UDP have port numbers. ICMP uses type code instead of port number which identifies purpose of that packet. Default policy: It is very difficult to explicitly cover every possible rule on the firewall. For this reason, the firewall must always have a default policy. Default policy only consists of action (accept, reject or drop). Suppose no rule is defined about SSH connection to the server on the firewall. So, it will follow the default policy. If default policy on the firewall is set to accept, then any computer outside of your office can establish an SSH connection to the server. Therefore, setting default policy as drop (or reject) is always a good practice. Firewalls can be categorized based on its generation. 1. First Generation- Packet Filtering Firewall : Packet filtering firewall is used to control network access by monitoring outgoing and incoming packet and allowing them to pass or stop based on source and destination IP address, protocols and ports. It analyses traffic at the transport protocol layer (but mainly uses first 3 layers). Packet firewalls treat each packet in isolation. They have no ability to tell whether a packet is part of an existing stream of traffic. Only It can allow or deny the packets based on unique packet headers. Packet filtering firewall maintains a filtering table which decides whether the packet will be forwarded or discarded. From the given filtering table, the packets will be Filtered according to following rules:
  • 2. Page 2 of 5 1. Incoming packets from network 192.168.21.0 are blocked. 2. Incoming packets destined for internal TELNET server (port 23) are blocked. 3. Incoming packets destined for host 192.168.21.3 are blocked. 4. All well-known services to the network 192.168.21.0 are allowed. 2. Second Generation- Stateful Inspection Firewall : Stateful firewalls (performs Stateful Packet Inspection) are able to determine the connection state of packet, unlike Packet filtering firewall, which makes it more efficient. It keeps track of the state of networks connection travelling across it, such as TCP streams. So the filtering decisions would not only be based on defined rules, but also on packet’s history in the state table. 3. Third Generation- Application Layer Firewall : Application layer firewall can inspect and filter the packets on any OSI layer, up to the application layer. It has the ability to block specific content, also recognize when certain application and protocols (like HTTP, FTP) are being misused. In other words, Application layer firewalls are hosts that run proxy servers. A proxy firewall prevents the direct connection between either side of the firewall, each packet has to pass through the proxy. It can allow or block the traffic based on predefined rules. Note: Application layer firewalls can also be used as Network Address Translator(NAT). 4. Next Generation Firewalls (NGFW) : Next Generation Firewalls are being deployed these days to stop modern security breaches like advance malware attacks and application-layer attacks. NGFW consists of Deep Packet Inspection, Application Inspection, SSL/SSH inspection and many functionalities to protect the network from these modern threats. Firewalls are generally of two types: Host-based and Network-based. 1. Host- based Firewalls : Host-based firewall is installed on each network node which controls each incoming and outgoing packet. It is a software application or suite of applications, comes as a part of the operating system. Host-based firewalls are needed because network firewalls cannot provide protection inside a trusted network. Host firewall protects each host from attacks and unauthorized access. 2. Network-based Firewalls : Network firewall function on network level. In other words, these firewalls filter all incoming and outgoing traffic across the network. It protects the internal network by filtering the traffic using rules defined on the firewall. A Network firewall might have two or more network interface cards (NICs). A network-based firewall is usually a dedicated system with proprietary software installed. A firewall is a network security system which monitors and takes actions on the ingoing or outgoing packets based on the defined rules. It can be a hardware device or a software. An organisation that cannot afford a hardware firewall device uses an alternative i.e implementing firewall features on Cisco IOS router by using CBAC or by using Zone-based firewall.CBAC is a predecessor to Zone-based firewall. Zone-based Firewall – A Zone-based firewall is an advanced method of stateful firewall. In stateful firewall, a stateful database is maintained in which source IP address, destination IP address, source Port number, destination port number is recorded. Due to this, only the replies are allowed i.e if the traffic is Generated from inside the network then only the replies (of inside network traffic) coming from outside the network is allowed. Cisco IOS router can be made firewall through two methods: 1. By using CBAC: create an access-list and apply it to the interfaces keeping in mind what traffic should be allowed or denied and in what direction. This has an extra overhead for the administrator. 2. Using a Zone-based firewall. Terms: 1. Zone – A zone is a logical area in which the devices having same trust levels resides. After creating a zone, an interface is assigned to a zone.By default, traffic is not allowed from one zone to another.
  • 3. Page 3 of 5 For example, first we create a zone called inside then if the router interface fa0/0 resides on the most trusted network which we name as inside, then fa0/0 is assigned to inside zone. 2. Zone-pair – Policies are defined in which traffic is identified (what type of traffic) then what action should be taken (Inspect Denied, permit). Then we have to apply this policies to a zone-pair. A zone-pair is always unidirectional. If we want to make it bidirectional then we have to create another zone-pair. For instance, we want to allow the traffic from inside to outside network then we have to create a zone-pair. If we have chosen the action inspect then the reply is permitted from outside the network if the traffic is generated from the inside network (stateful filtering). Now, if we want to allow outside traffic to be able to reach inside network then we have to make a separate zone-pair. This zone-pair will allow the traffic to reach the inside network if the traffic is generated from the outside network. 3. Self-zone – Traffic destined to the router itself, irrespective of which device has send, is known as self zone. The traffic generated from router is known as traffic coming from self-zone. Traffic going to router is considered as traffic going to Self- zone. By default, the traffic to or from the Self-zone is allowed however it can be changed according to the policies applied. Working: First, the zones are defined and named. Although, we can give any name but by naming convention that makes sense, name the zones as inside, outside and DMZ.  inside: The most trusted (private) network.  outside: The most untrusted (public) network.  DMZ: (public zone) contains devices like servers. Now, as zones have been named, policies are created which will include what type of traffic is allowed to be generated and allowed to go through from inside network to outside network and what actions (such as inspect [stateful inspection]) should be taken on the traffic. The actions can be:  inspect: an entry will be made in stateful database for the protocols (for which the policies has been applied) so that the replies (for inside network) can come back.  drop: default action if the traffic does not match the policies.  pass: the traffic will be allowed from one zone to another but no session is maintained. The traffic which will not match the policies will be dropped due to default policy. This policies will be defined for one direction (such as inside to outside) in a zone pair. If conditions requires to allow initial traffic to be generated in both directions (inside to outside network and outside to inside network), then two separate zone-pairs will be created and separate policies are applied. Advantages – Some of the advantages are: 1. By default, the traffic is blocked unlike CBAC. In Zone-based firewall, no traffic is allowed from one zone to another while in CBAC, all traffic is allowed if no explicit ACL is applied. 2. Unlike CBAC, Zone-based firewall is no heavily dependent on ACL. 3. It is easy to add another interface as only the zone has to be declared to which the interface belongs as all the policies will be same as applied explicitly before for that zone.
  • 4. Page 4 of 5 A firewall is a network security system which monitors and takes actions (permit or deny traffic) on the basis of policies defined explicitly.It can be performed by a single device, group of devices or by software running on a single device like server. Cisco ASA has the biggest share in the market while there are other vendors of firewall also like checkpoint, Juniper etc. Firewall Methodologies – There are certain methods through which firewall can be implemented. These are as follows: 1. Static packet filtering – Packet filtering is a firewall technique used to control access on the basis of source IP address, destination IP address, source Port number and destination port number. It works on layer 3 and 4 of OSI model.Also, an ACL doesn’t maintain the state of session. A router with ACL applied on it is an example of static packet filtering. Advantages –  If the administrator has a good knowledge of network, it is easy to implement.  It can be configured on almost all routers.  It has minimal effect on network performance. Disadvantage –  Large amount of ACLs are difficult to maintain.  ACLs uses IP address for filtering. If someone spoofs the same source IP address then that will be allowed by ACL. 2. Stateful packet filtering – In stateful packet filtering, the state of the sessions are maintained i.e when a session is initiated within a trusted network, it’s source and destination IP address, source and destination ports and other layer information are recorded. By default, all the traffic from untrusted network is denied. The replies of this session will be allowed only when the IP addresses (source and destination IP address) and port numbers (source and destination )are swapped. Advantages –  Dynamic in nature as compared to static packet filtering.  Not susceptible to IP spoofing.  Can be implemented on routers. Disadvantage –  Might not be able to prevent application layer attack.  Some applications open dynamic ports on the server side, if the firewall is analysing this, it can cause application failure. This is where application inspection comes into use. 3. Proxy firewalls – These are also known as application layer firewalls. Proxy firewall acts as an intermediary between the original client and the server. No direct connection takes place between the original client and the server. The client, who has to establish a connection directly to the server to communicate with it, now have to establish a connection with proxy server. The proxy server then establishes a connection with the server on the behalf of client. Now, the client sends the data to the proxy server and proxy server forwards it to the server. Proxy server can operate upto layer 7 (application layer). Advantage –  Difficult to attack server as proxy server is the intermediate between the client and the server.  Can provide detailed logging.  Can be implemented on common hardware. Disadvantage –  Processor intensive  Memory and disk intensive  Single point of failure in network security 4. Application inspection – These can analyze the packet upto layer 7 (deep inspection) but can’t act as a proxy server. These can deeply analyze conversation between a client and server even when the server is assigning a dynamic port to the client therfore it doesn’t fail in these cases (which can occur in stateful firewall). Advantages –  Can analyze deeper into the conversation between the server and the client.  If there is a protocol anamoly happening from standard then it can deny the packets. 5. Transparent firewall – By default, the firewall operates at layer 3 but the benefit of using transparent firewall is that it can operate at layer 2.It has 2
  • 5. Page 5 of 5 interfaces which will act like a bridge so can be configured through a single management IP address. Also, users accessing the network will not even know about that a firewall exists. The main advantage of using transparent firewall is that we don’t need to re-address our networks while putting up a firewall in our network. Also, while operating at layer 2, it can still perform functions like building stateful database, application inspection etc. 6. Network Address Translation (NAT) – NAT is implemented on a router or firewall. NAT is used to translate private IP address into a public IP address through which we can hide our source IP address. And if we are using dynamic NAT or PAT, an attacker will not be able to know that what devices are dynamically assigned which IP address from the pool. This makes difficult to make a connection from outside world to our private network. 7. Next-Generation Firewalls – NGFWs are third generation security firewall that is implemented in either in software or device. It combines basic firewall properties like static packet filtering, application inspection with advanced security features like integrated intrusion prevention system. Cisco AAA with firePOWER services is an example of Next-Generation firewall.