SlideShare a Scribd company logo
   Stateful Packet Inspection (on by default)
    ◦ The firewall function keeps track of TCP and UDP connections
      made by network applications
    ◦ The firewall maintains a state table and the details of each
      connection (source IP and port, destination IP and
      port, sequence no and timestamp)
       Connections from the inside network to the outside are permitted
        and monitored
       Reply traffic on an existing connection for inside network from the
        outside is permitted
       New connections from the outside to the inside network are NOT
        permitted
    ◦ Stateful Packet Inspection can detect replayed packets by
      unexpected sequence numbers and timestamps
   Filter anonymous Internet Requests (on by default)
    ◦ Drops pings from outside hosts and drops connection requests from
      the outside
   Filter Multicast (Off by default)
    ◦ Multicast traffic is sent to many hosts that are configured as part of a
      multicast group by registering with the multicast application
    ◦ Multicast is used to stream multimedia by allowing 1 stream to be sent
      to the router/switch and then the stream is copied to each registered
      host
    ◦ Disable filtering to permit multicast traffic
    ◦ Enable filtering to prevent multicast DOS attacks
   Filter Internet NAT Redirection (disabled)
    ◦ Block access to other local hosts from a local computer connection via
      the external NAT address
   Filter IDENT Port 113 (on by default)
    ◦ Drops IDENT requests which ask for info: local and remote ports, OS
      and username
   SPI is Stateful Packet Inspection
    ◦ On by default
   By default
    ◦ Drop connections
     starting from the outside
 Drop request for identity
info on Port 113
Web filter for proxy, java,
activeX and cookies

More Related Content

What's hot

Snort
SnortSnort
Snort
SnortSnort
Snort
nazzf
 
Week14_Web_Presentation
Week14_Web_PresentationWeek14_Web_Presentation
Week14_Web_Presentationguestb64a7e
 
Port scanning
Port scanningPort scanning
Port scanning
Hemanth Pasumarthi
 
Darkweb + Python: discover, analyze and extract information from hidden services
Darkweb + Python: discover, analyze and extract information from hidden servicesDarkweb + Python: discover, analyze and extract information from hidden services
Darkweb + Python: discover, analyze and extract information from hidden services
Jose Manuel Ortega Candel
 
St Louis Linux Users Group Wireguard (for Fun and Networking)
St Louis Linux Users Group Wireguard (for Fun and Networking)St Louis Linux Users Group Wireguard (for Fun and Networking)
St Louis Linux Users Group Wireguard (for Fun and Networking)
Andrew Denner
 
Http tunneling exploit daniel adenew web
Http tunneling exploit daniel adenew webHttp tunneling exploit daniel adenew web
Http tunneling exploit daniel adenew webDaniel Adenew
 
TekTape - Audio Recorder for SIP Calls
TekTape - Audio Recorder for SIP CallsTekTape - Audio Recorder for SIP Calls
TekTape - Audio Recorder for SIP Calls
Yasin KAPLAN
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
joebeone
 
Wiretapping
WiretappingWiretapping
Wiretapping
Mr Cracker
 
Layer 8 and Why People are the Most Important Security Tool
Layer 8 and Why People are the Most Important Security ToolLayer 8 and Why People are the Most Important Security Tool
Layer 8 and Why People are the Most Important Security Tool
Damon Small
 
By Nithin & group
By Nithin & groupBy Nithin & group
By Nithin & groupSourav Roy
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol AnalyzerSourav Roy
 
Access control list [1]
Access control list [1]Access control list [1]
Access control list [1]
Summit Bisht
 
Linux firewall
Linux firewallLinux firewall
Linux firewall
chanmyaeag
 
Guide to protecting networks - Eric Vanderburg
Guide to protecting networks - Eric VanderburgGuide to protecting networks - Eric Vanderburg
Guide to protecting networks - Eric Vanderburg
Eric Vanderburg
 
Router security-configuration-guide-executive-summary
Router security-configuration-guide-executive-summaryRouter security-configuration-guide-executive-summary
Router security-configuration-guide-executive-summary
moonmanik
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
SRIMCA
 

What's hot (20)

Snort
SnortSnort
Snort
 
Snort
SnortSnort
Snort
 
Week14_Web_Presentation
Week14_Web_PresentationWeek14_Web_Presentation
Week14_Web_Presentation
 
Firewall
FirewallFirewall
Firewall
 
Port scanning
Port scanningPort scanning
Port scanning
 
Darkweb + Python: discover, analyze and extract information from hidden services
Darkweb + Python: discover, analyze and extract information from hidden servicesDarkweb + Python: discover, analyze and extract information from hidden services
Darkweb + Python: discover, analyze and extract information from hidden services
 
St Louis Linux Users Group Wireguard (for Fun and Networking)
St Louis Linux Users Group Wireguard (for Fun and Networking)St Louis Linux Users Group Wireguard (for Fun and Networking)
St Louis Linux Users Group Wireguard (for Fun and Networking)
 
Http tunneling exploit daniel adenew web
Http tunneling exploit daniel adenew webHttp tunneling exploit daniel adenew web
Http tunneling exploit daniel adenew web
 
TekTape - Audio Recorder for SIP Calls
TekTape - Audio Recorder for SIP CallsTekTape - Audio Recorder for SIP Calls
TekTape - Audio Recorder for SIP Calls
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Wiretapping
WiretappingWiretapping
Wiretapping
 
Layer 8 and Why People are the Most Important Security Tool
Layer 8 and Why People are the Most Important Security ToolLayer 8 and Why People are the Most Important Security Tool
Layer 8 and Why People are the Most Important Security Tool
 
By Nithin & group
By Nithin & groupBy Nithin & group
By Nithin & group
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
Access control list [1]
Access control list [1]Access control list [1]
Access control list [1]
 
Linux firewall
Linux firewallLinux firewall
Linux firewall
 
Guide to protecting networks - Eric Vanderburg
Guide to protecting networks - Eric VanderburgGuide to protecting networks - Eric Vanderburg
Guide to protecting networks - Eric Vanderburg
 
Router security-configuration-guide-executive-summary
Router security-configuration-guide-executive-summaryRouter security-configuration-guide-executive-summary
Router security-configuration-guide-executive-summary
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
 
Sniffing via dsniff
Sniffing via dsniffSniffing via dsniff
Sniffing via dsniff
 

Viewers also liked

Firewall
FirewallFirewall
Firewall
FirewallFirewall
Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)
Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)
Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)
Stephanie Alejandra Hernández Morales
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoT
Semyon Teplisky
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
Yovan Chandel
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
Mohammed Maajidh
 
Tracxn Research — Industrial IoT Landscape, October 2016
Tracxn Research —  Industrial IoT Landscape, October 2016Tracxn Research —  Industrial IoT Landscape, October 2016
Tracxn Research — Industrial IoT Landscape, October 2016
Tracxn
 
Firewall
Firewall Firewall
Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016
Bernard Moon
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 

Viewers also liked (12)

Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)
Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)
Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoT
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Tracxn Research — Industrial IoT Landscape, October 2016
Tracxn Research —  Industrial IoT Landscape, October 2016Tracxn Research —  Industrial IoT Landscape, October 2016
Tracxn Research — Industrial IoT Landscape, October 2016
 
Firewall
Firewall Firewall
Firewall
 
Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 

Similar to Firewall

Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
inbroker
 
TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGS
CrowdStrike
 
Network security
 Network security Network security
Network security
Vikas Jagtap
 
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network SignaturesPractical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Sam Bowne
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
BachaSirata
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
Techvilla
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
osint + python: extracting information from tor network and darkweb
osint + python: extracting information from tor network and darkweb osint + python: extracting information from tor network and darkweb
osint + python: extracting information from tor network and darkweb
Jose Manuel Ortega Candel
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasuresdkaya
 
Firewall Facts
Firewall FactsFirewall Facts
Firewall Facts
DAVID RAUDALES
 
Firewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth FirewallsFirewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth Firewalls
phanleson
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
sonuagain
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
Rehan ali
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
9921103075
 
Firewalls
FirewallsFirewalls
Firewalls
hemantag
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
Raj Kumar
 

Similar to Firewall (20)

Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGS
 
Network security
 Network security Network security
Network security
 
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network SignaturesPractical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
osint + python: extracting information from tor network and darkweb
osint + python: extracting information from tor network and darkweb osint + python: extracting information from tor network and darkweb
osint + python: extracting information from tor network and darkweb
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasures
 
Firewall
FirewallFirewall
Firewall
 
Firewall Facts
Firewall FactsFirewall Facts
Firewall Facts
 
Firewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth FirewallsFirewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth Firewalls
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; Firewalls
 
Firewall
FirewallFirewall
Firewall
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls (6)
Firewalls (6)Firewalls (6)
Firewalls (6)
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 

More from lyndyv

Datarate
DatarateDatarate
Dataratelyndyv
 
Logging
LoggingLogging
Logginglyndyv
 
Policy
PolicyPolicy
Policylyndyv
 
Capacity
CapacityCapacity
Capacitylyndyv
 
Security standard
Security standardSecurity standard
Security standardlyndyv
 
Auth and association
Auth and associationAuth and association
Auth and associationlyndyv
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilterslyndyv
 
Csmaca
CsmacaCsmaca
Csmacalyndyv
 
Basic config
Basic configBasic config
Basic configlyndyv
 
Service set
Service setService set
Service setlyndyv
 
Signals1
Signals1Signals1
Signals1lyndyv
 
Modulation
ModulationModulation
Modulationlyndyv
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standardslyndyv
 
Wireless components
Wireless componentsWireless components
Wireless componentslyndyv
 

More from lyndyv (16)

Datarate
DatarateDatarate
Datarate
 
Logging
LoggingLogging
Logging
 
Policy
PolicyPolicy
Policy
 
Capacity
CapacityCapacity
Capacity
 
Security standard
Security standardSecurity standard
Security standard
 
Auth and association
Auth and associationAuth and association
Auth and association
 
Dhcp
DhcpDhcp
Dhcp
 
Nat
NatNat
Nat
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilters
 
Csmaca
CsmacaCsmaca
Csmaca
 
Basic config
Basic configBasic config
Basic config
 
Service set
Service setService set
Service set
 
Signals1
Signals1Signals1
Signals1
 
Modulation
ModulationModulation
Modulation
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
 
Wireless components
Wireless componentsWireless components
Wireless components
 

Firewall

  • 1. Stateful Packet Inspection (on by default) ◦ The firewall function keeps track of TCP and UDP connections made by network applications ◦ The firewall maintains a state table and the details of each connection (source IP and port, destination IP and port, sequence no and timestamp)  Connections from the inside network to the outside are permitted and monitored  Reply traffic on an existing connection for inside network from the outside is permitted  New connections from the outside to the inside network are NOT permitted ◦ Stateful Packet Inspection can detect replayed packets by unexpected sequence numbers and timestamps
  • 2. Filter anonymous Internet Requests (on by default) ◦ Drops pings from outside hosts and drops connection requests from the outside  Filter Multicast (Off by default) ◦ Multicast traffic is sent to many hosts that are configured as part of a multicast group by registering with the multicast application ◦ Multicast is used to stream multimedia by allowing 1 stream to be sent to the router/switch and then the stream is copied to each registered host ◦ Disable filtering to permit multicast traffic ◦ Enable filtering to prevent multicast DOS attacks  Filter Internet NAT Redirection (disabled) ◦ Block access to other local hosts from a local computer connection via the external NAT address  Filter IDENT Port 113 (on by default) ◦ Drops IDENT requests which ask for info: local and remote ports, OS and username
  • 3. SPI is Stateful Packet Inspection ◦ On by default  By default ◦ Drop connections starting from the outside  Drop request for identity info on Port 113 Web filter for proxy, java, activeX and cookies