SlideShare a Scribd company logo
1 of 17
SUB: Computer System Security
Presented By
Mr. VIVEK TTRIATHI
ASSISTANT PROFESSOR
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
KCNIT,BANDA
What is a Firewall
 A Firewall is a network security device that monitors and
filters incoming and outgoing network traffic based on an
organization’s previously established security policies.
 A firewall is essentially the barrier that sits between a
private internal network and the public Internet.
 A firewall’s main purpose is to allow non-threatening
traffic in and to keep dangerous traffic out.
Types of firewalls
Firewalls are classified as either software or hardware
firewalls, depending on their structure. Each type of
firewall serves a distinct purpose while providing the
same functionality. However, having both is
recommended for maximum protection.
A hardware firewall is a physical piece of equipment that
connects a computer network to a gateway. Consider a
broadband router as an example. An Appliance Firewall is
another name for a hardware firewall.
A software firewall is a simple program that is installed on
a computer and operates via port numbers and other
installed software. This type of firewall is also known as a
Host Firewall.
There are four different types of firewalls.
 Packet Filtering Firewalls. Packet filtering firewalls are
the oldest, most basic type of firewalls.
 Circuit-Level Gateways.
 Stateful Inspection Firewalls.
 Application-Level Gateways (Proxy Firewalls)
Firewall is a software or hardware
 The main difference between a hardware firewall and a
software firewall is that the hardware firewall runs on
its own physical device, while a software firewall is
installed on another machine.
 A common example of a software firewall is the
firewall built into most operating systems like
Windows and macOS. These OS firewalls are bundled
with the operating system and can run on any
compatible hardware.
Packet Filtering Firewall
 A packet filtering firewall is a network security feature
that controls the flow of incoming and outgoing network
data. The firewall examines each packet, which comprises
user data and control information, and tests them
according to a set of pre-established rules.
 If the packet completes the test successfully, the firewall
allows it to pass through to its destination.
 It rejects those that don't pass the test.
 Firewalls test packets by examining sets of rules,
protocols, ports and destination addresses.
Why do firewalls use packet filtering
 Packet filtering is an efficient defense system against
intrusions from computers or networks outside a local area
network (LAN).
 It is also a standard, and cost-effective means of protection
as most routing devices possess integrated filtering
capabilities, so there is no need to set a new firewall
device.
Where is packet filtering firewall
used:
 Packet-filtering firewalls operate at the network
layer (Layer 3) of the OSI model.
 Packet-filtering firewalls make processing decisions
based on network addresses, ports, or protocols.
 Packet-filtering firewalls are very fast because there is
not much logic going behind the decisions they make.
How is packet filtering used
 Packet filtering is a firewall technique used to control
network access by monitoring outgoing and incoming
packets and allowing them to pass or halt based on the
source and destination Internet Protocol (IP) addresses,
protocols and ports.
 Packets are structured data units. Because they divide
communications into small bits and transport them
independently across the network, these networks are
fault-tolerant.
 In order to display accurate information, packages are
reordered after passing through the firewall and arriving at
their destination.
Packets include two essential components:
 Data is directed to the correct location using packet
headers. They include internet protocol (IP) elements,
addressing, and any other data needed to deliver packets to
their destination.
 The user data contained within the packet is referred to as
the payload. This is the data that is trying to get
somewhere.
Example of Packet Filtering Firewalls:
 Denying outsiders access to port 80, for example, would
prevent all outside access to the HTTP server, because
most HTTP servers run on port 80.
 You can also configure your firewall to allow only packets
intended for your mail or web server while rejecting all
others.
Packet filtering firewalls allow or deny network
packets based on the following criteria:
 The source IP address is where the packet is being sent
from.
 The packet’s address is the destination IP address.
 Protocols: Protocols include data transfer protocols such as
session and application protocols (TCP, UDP, ICMP).
 Ports include source and destination ports, as well as ICMP
types and codes.
 Flags include TCP header flags such as whether the packet
is a connect request.
 The physical interface (NIC) that the packet is passing
through (incoming or outgoing).
Benefits of Packet Filtering Firewalls
 Packet filtering firewalls is best efficient method
because Routers typically operate at high speeds,
accepting and rejecting packets as quickly as possible
based on their destinations, source ports, and
addresses
 Packet filtering is extremely cost-effective because
only one filtering router is required to secure the
internal network.
 Packet filtering is an appealing option due to its low
cost and ease of use
Drawbacks of using a Packet Filtering
firewall
 The primary disadvantage of packet filtering is that it is
based on IP address and port number rather than context
or application information.
 Lack of Logging Capabilities: If the packet filter lacks
logging capabilities, it can pose a problem for a company
that must meet compliance and reporting requirements.
 Packet filtering is that it is fundamentally stateless, which
means that it monitors each packet independently,
regardless of the established connection or previous
packets that have passed through it. As a result, the ability
of firewalls to protect against severe threats and attacks is
quite limited.
CSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptx

More Related Content

What's hot

Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIRJET Journal
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash functionChirag Patel
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniquesShubham Jain
 
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training SessionInfocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training SessionInfocyte
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash functionMijanur Rahman Milon
 
Network security Lab manual
Network security Lab manual Network security Lab manual
Network security Lab manual Vivek Kumar Sinha
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Information and network security 21 strength of des
Information and network security 21 strength of desInformation and network security 21 strength of des
Information and network security 21 strength of desVaibhav Khanna
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static AnalysisHossein Yavari
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportMohit Kumar
 
Cryptography & Network Security
Cryptography & Network SecurityCryptography & Network Security
Cryptography & Network SecurityFahad Shaikh
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeAdam Barrera
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1RAMESHBABU311293
 
Komunikacioni medijum
Komunikacioni medijumKomunikacioni medijum
Komunikacioni medijumSenja Savić
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 

What's hot (20)

Intelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep LearningIntelligent Video Surveillance System using Deep Learning
Intelligent Video Surveillance System using Deep Learning
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training SessionInfocyte - Digital Forensics and Incident Response (DFIR) Training Session
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
Network security Lab manual
Network security Lab manual Network security Lab manual
Network security Lab manual
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Information and network security 21 strength of des
Information and network security 21 strength of desInformation and network security 21 strength of des
Information and network security 21 strength of des
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static Analysis
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cryptography & Network Security
Cryptography & Network SecurityCryptography & Network Security
Cryptography & Network Security
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
 
Komunikacioni medijum
Komunikacioni medijumKomunikacioni medijum
Komunikacioni medijum
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 

Similar to CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx

Similar to CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx (20)

Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptx
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Firewall
FirewallFirewall
Firewall
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
What is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxWhat is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptx
 
Unit II Chapter 6 firewalls.ppt
Unit II Chapter 6 firewalls.pptUnit II Chapter 6 firewalls.ppt
Unit II Chapter 6 firewalls.ppt
 
FIREWALL
FIREWALLFIREWALL
FIREWALL
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx

  • 1. SUB: Computer System Security Presented By Mr. VIVEK TTRIATHI ASSISTANT PROFESSOR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING KCNIT,BANDA
  • 2.
  • 3. What is a Firewall  A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies.  A firewall is essentially the barrier that sits between a private internal network and the public Internet.  A firewall’s main purpose is to allow non-threatening traffic in and to keep dangerous traffic out.
  • 4.
  • 5. Types of firewalls Firewalls are classified as either software or hardware firewalls, depending on their structure. Each type of firewall serves a distinct purpose while providing the same functionality. However, having both is recommended for maximum protection. A hardware firewall is a physical piece of equipment that connects a computer network to a gateway. Consider a broadband router as an example. An Appliance Firewall is another name for a hardware firewall. A software firewall is a simple program that is installed on a computer and operates via port numbers and other installed software. This type of firewall is also known as a Host Firewall.
  • 6. There are four different types of firewalls.  Packet Filtering Firewalls. Packet filtering firewalls are the oldest, most basic type of firewalls.  Circuit-Level Gateways.  Stateful Inspection Firewalls.  Application-Level Gateways (Proxy Firewalls)
  • 7. Firewall is a software or hardware  The main difference between a hardware firewall and a software firewall is that the hardware firewall runs on its own physical device, while a software firewall is installed on another machine.  A common example of a software firewall is the firewall built into most operating systems like Windows and macOS. These OS firewalls are bundled with the operating system and can run on any compatible hardware.
  • 8. Packet Filtering Firewall  A packet filtering firewall is a network security feature that controls the flow of incoming and outgoing network data. The firewall examines each packet, which comprises user data and control information, and tests them according to a set of pre-established rules.  If the packet completes the test successfully, the firewall allows it to pass through to its destination.  It rejects those that don't pass the test.  Firewalls test packets by examining sets of rules, protocols, ports and destination addresses.
  • 9. Why do firewalls use packet filtering  Packet filtering is an efficient defense system against intrusions from computers or networks outside a local area network (LAN).  It is also a standard, and cost-effective means of protection as most routing devices possess integrated filtering capabilities, so there is no need to set a new firewall device.
  • 10. Where is packet filtering firewall used:  Packet-filtering firewalls operate at the network layer (Layer 3) of the OSI model.  Packet-filtering firewalls make processing decisions based on network addresses, ports, or protocols.  Packet-filtering firewalls are very fast because there is not much logic going behind the decisions they make.
  • 11. How is packet filtering used  Packet filtering is a firewall technique used to control network access by monitoring outgoing and incoming packets and allowing them to pass or halt based on the source and destination Internet Protocol (IP) addresses, protocols and ports.  Packets are structured data units. Because they divide communications into small bits and transport them independently across the network, these networks are fault-tolerant.  In order to display accurate information, packages are reordered after passing through the firewall and arriving at their destination.
  • 12. Packets include two essential components:  Data is directed to the correct location using packet headers. They include internet protocol (IP) elements, addressing, and any other data needed to deliver packets to their destination.  The user data contained within the packet is referred to as the payload. This is the data that is trying to get somewhere.
  • 13. Example of Packet Filtering Firewalls:  Denying outsiders access to port 80, for example, would prevent all outside access to the HTTP server, because most HTTP servers run on port 80.  You can also configure your firewall to allow only packets intended for your mail or web server while rejecting all others.
  • 14. Packet filtering firewalls allow or deny network packets based on the following criteria:  The source IP address is where the packet is being sent from.  The packet’s address is the destination IP address.  Protocols: Protocols include data transfer protocols such as session and application protocols (TCP, UDP, ICMP).  Ports include source and destination ports, as well as ICMP types and codes.  Flags include TCP header flags such as whether the packet is a connect request.  The physical interface (NIC) that the packet is passing through (incoming or outgoing).
  • 15. Benefits of Packet Filtering Firewalls  Packet filtering firewalls is best efficient method because Routers typically operate at high speeds, accepting and rejecting packets as quickly as possible based on their destinations, source ports, and addresses  Packet filtering is extremely cost-effective because only one filtering router is required to secure the internal network.  Packet filtering is an appealing option due to its low cost and ease of use
  • 16. Drawbacks of using a Packet Filtering firewall  The primary disadvantage of packet filtering is that it is based on IP address and port number rather than context or application information.  Lack of Logging Capabilities: If the packet filter lacks logging capabilities, it can pose a problem for a company that must meet compliance and reporting requirements.  Packet filtering is that it is fundamentally stateless, which means that it monitors each packet independently, regardless of the established connection or previous packets that have passed through it. As a result, the ability of firewalls to protect against severe threats and attacks is quite limited.