SlideShare a Scribd company logo
Objectives:
• Define a Firewall
• Identify the different types of a firewall and its
purpose
• Configure the Firewall
WHAT IS A ?
https://www.youtube.com/watch?v=x1YLj06c3hM
A firewall is a piece of software that stands
between a computer or network and the Internet. A
firewall serves to block these unauthorized
requests, passing through only designated traffic.
The Firewall
Firewall Design Principles
• Aims:
– Establish a controlled link
– Protect the premises network from Internet-based attacks
– Provide a single choke point
9
Four general techniques of a
Firewall :
1. Service control
– Determines the types of Internet services that can be accessed,
inbound or outbound
2. Direction control
– Determines the direction in which particular service requests are
allowed to flow
3. User control
– Controls access to a service according to which user is attempting
to access it
4. Behavior control
– Controls how particular services are used (e.g. filter e-mail)
10
• Application level Gateway Firewalls (Proxy)
• Stateful Multilayer Inspection Firewalls
• Packet Filtering Firewalls
• Circuit Level Gateway Firewalls
Types of Firewalls
PROXY FIREWALL
• A proxy firewall serves as the gateway from one
network to another for a specific application.
13
Types of Firewalls
Stateful Multilayer Inspection Firewalls
• known as dynamic packet filtering, is a firewall
technology that monitors the state of active
connections and uses this information to determine
which network packets to allow through the
firewall.
14
Types of Firewalls
15
Packet Filtering Firewalls
• Packet filtering
firewalls work at levels 3
and 4 of the
TCP/IP protocol stack,
filtering TCP and UCP
packets based on any
combination of source IP
address, destination IP
address, source port,
or destination port.
Types of Firewalls
Circuit Level Gateway Firewalls
A circuit-level gateway monitors TCP handshaking
between packets from trusted clients or servers to
untrusted hosts and vice versa to determine whether
a requested session is legitimate. To filter packets
in this way, a circuit-level gateway relies on data
contained in the packet headers for the Internet's
TCP session-layer protocol. Because a circuit-level
gateway filters packets at the session layer of the
OSI model, this gateway operates two layers higher
than a packet-filtering firewall does. 16
Types of Firewalls
THREAT-FOCUSED NGFW
• These firewalls include all the capabilities of a traditional NGFW and
also provide advanced threat detection and remediation.
• Know which assets are most at risk with complete context awareness
• Quickly react to attacks with intelligent security automation that sets
policies and hardens your defenses dynamically
• Better detect evasive or suspicious activity with network and endpoint
event correlation
• Greatly decrease the time from detection to cleanup with retrospective
security that continuously monitors for suspicious activity and behavior
even after initial inspection
• Ease administration and reduce complexity with unified policies that
protect across the entire attack continuum
17
IN ADDITION TO THE USE OF SIMPLE CONFIGURATION OF A SINGLE
SYSTEM (SINGLE PACKET FILTERING ROUTER OR SINGLE GATEWAY),
MORE COMPLEX CONFIGURATIONSARE POSSIBLE
THREE COMMON CONFIGURATIONS
QUIZ:
1. The purpose of a firewall on computer networks is to -
a. Prevent computers from overheating
b. Prevent unwanted network connections from being made
c. Allow more than 4 computers to share the same Internet connection
d. Allow pictures and video to be downloaded from a camera to a computer
2. Which one of the following can be considered to be a hardware firewall?
a. Router
b. Hub
c. Bridge
d. Switch
3. Which of the following are true about Firewalls?
a. Filters network traffic
b. Can be either a hardware or software device
c. Follows a set of rules
d. All the above
4. Which one of the following is a key function of a firewall?
a. Monitoring
b. Copying
c. Deleting
d. Moving
5. What is "phishing?
a. "Spoofed" e-mails and fraudulent websites designed to fool recipients
into divulging personal financial data such as credit card numbers, account
usernames and passwords
b. A type of computer virus
c. An example of a strong password
d. None of the above
6. What are some of the benefits of using a firewall for your LAN?
a. Increased access to Instant Messaging
b. Stricter access control to critical resources
c. Greater security to your LAN
d. Both 2 and 3
7. VIRUS stands for
a. Very Important Resource Under Search
b. Virtual Information Resource Under Resize
c. Verify Interchange Result Until Source
d. Very Important Record User Searched
8. Most enterprises implement several basic security
measures. Which of the following is NOT a common security
practice?
a. Content monitoring
b. Fault tolerance
c. Firewall
d. Intrusion-detection system
Resources:
https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html
https://community.windows.com/en-us/videos/firewall-network-protections-keep-
unwanted-online-traffic-out/pfyyc9XdT5M
Firewall

More Related Content

What's hot

Hardware virtualization basic
Hardware virtualization basicHardware virtualization basic
Hardware virtualization basic
Sanoj Kumar
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
hktripathy
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
Shashi soni
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
Dr.Neeraj Kumar Pandey
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
elliando dias
 
VMware vSphere 5.1 Overview
VMware vSphere 5.1 OverviewVMware vSphere 5.1 Overview
VMware vSphere 5.1 Overview
ESXLab
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu Jaeger
Spiceworks
 
Virtualization
VirtualizationVirtualization
Virtualization
vishnurk
 
Virtualisation basics
Virtualisation basicsVirtualisation basics
Virtualisation basics
sagaroceanic11
 
Virtual Machine Concept
Virtual Machine ConceptVirtual Machine Concept
Virtual Machine Concept
fatimaanique1
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
Dhrupesh Kotadiya
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
rjain51
 
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Spiceworks
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
Ashok Kumar
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
Mehul Boghra
 
Virtual Machine Migration & Hypervisors
Virtual Machine Migration & HypervisorsVirtual Machine Migration & Hypervisors
Virtual Machine Migration & Hypervisors
Arun Shukla
 
Virtualization
VirtualizationVirtualization
Virtualization
Kingston Smiler
 
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Spiceworks
 
Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloud
Chetna Purohit
 
1.Introduction to virtualization
1.Introduction to virtualization1.Introduction to virtualization
1.Introduction to virtualization
Hwanju Kim
 

What's hot (20)

Hardware virtualization basic
Hardware virtualization basicHardware virtualization basic
Hardware virtualization basic
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
VMware vSphere 5.1 Overview
VMware vSphere 5.1 OverviewVMware vSphere 5.1 Overview
VMware vSphere 5.1 Overview
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu Jaeger
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualisation basics
Virtualisation basicsVirtualisation basics
Virtualisation basics
 
Virtual Machine Concept
Virtual Machine ConceptVirtual Machine Concept
Virtual Machine Concept
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
 
Virtual Machine Migration & Hypervisors
Virtual Machine Migration & HypervisorsVirtual Machine Migration & Hypervisors
Virtual Machine Migration & Hypervisors
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
 
Open source hypervisors in cloud
Open source hypervisors in cloudOpen source hypervisors in cloud
Open source hypervisors in cloud
 
1.Introduction to virtualization
1.Introduction to virtualization1.Introduction to virtualization
1.Introduction to virtualization
 

Similar to Firewall

Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
Hem Pokhrel
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
Jainam Shah
 
Network defenses
Network defensesNetwork defenses
Network defenses
G Prachi
 
Seminar
SeminarSeminar
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
ShreyaBanerjee52
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
ssuser530a07
 
Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
AschalewAyele2
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
Divya Jyoti
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
lamtran367679
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
Dr. Shivashankar
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
Radhika Talaviya
 
Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
crisma baby mathew
 
Firewalls
FirewallsFirewalls
Firewalls
vaishnavi
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
9921103075
 
Divyanshu.pptx
Divyanshu.pptxDivyanshu.pptx
Divyanshu.pptx
Divyanshu93112
 
Firewall (2)
Firewall (2)Firewall (2)
Firewall (2)
marghali
 
Firewalls
FirewallsFirewalls
Firewalls
Vibhor Raut
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
TAMBEMAHENDRA1
 

Similar to Firewall (20)

Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Seminar
SeminarSeminar
Seminar
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
 
Firewalls
FirewallsFirewalls
Firewalls
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
 
Divyanshu.pptx
Divyanshu.pptxDivyanshu.pptx
Divyanshu.pptx
 
Firewall (2)
Firewall (2)Firewall (2)
Firewall (2)
 
Firewalls
FirewallsFirewalls
Firewalls
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 

Recently uploaded

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 

Recently uploaded (20)

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 

Firewall

  • 1.
  • 2.
  • 3. Objectives: • Define a Firewall • Identify the different types of a firewall and its purpose • Configure the Firewall
  • 4. WHAT IS A ? https://www.youtube.com/watch?v=x1YLj06c3hM
  • 5.
  • 6. A firewall is a piece of software that stands between a computer or network and the Internet. A firewall serves to block these unauthorized requests, passing through only designated traffic. The Firewall
  • 7.
  • 8.
  • 9. Firewall Design Principles • Aims: – Establish a controlled link – Protect the premises network from Internet-based attacks – Provide a single choke point 9
  • 10. Four general techniques of a Firewall : 1. Service control – Determines the types of Internet services that can be accessed, inbound or outbound 2. Direction control – Determines the direction in which particular service requests are allowed to flow 3. User control – Controls access to a service according to which user is attempting to access it 4. Behavior control – Controls how particular services are used (e.g. filter e-mail) 10
  • 11.
  • 12. • Application level Gateway Firewalls (Proxy) • Stateful Multilayer Inspection Firewalls • Packet Filtering Firewalls • Circuit Level Gateway Firewalls
  • 13. Types of Firewalls PROXY FIREWALL • A proxy firewall serves as the gateway from one network to another for a specific application. 13
  • 14. Types of Firewalls Stateful Multilayer Inspection Firewalls • known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall. 14
  • 15. Types of Firewalls 15 Packet Filtering Firewalls • Packet filtering firewalls work at levels 3 and 4 of the TCP/IP protocol stack, filtering TCP and UCP packets based on any combination of source IP address, destination IP address, source port, or destination port.
  • 16. Types of Firewalls Circuit Level Gateway Firewalls A circuit-level gateway monitors TCP handshaking between packets from trusted clients or servers to untrusted hosts and vice versa to determine whether a requested session is legitimate. To filter packets in this way, a circuit-level gateway relies on data contained in the packet headers for the Internet's TCP session-layer protocol. Because a circuit-level gateway filters packets at the session layer of the OSI model, this gateway operates two layers higher than a packet-filtering firewall does. 16
  • 17. Types of Firewalls THREAT-FOCUSED NGFW • These firewalls include all the capabilities of a traditional NGFW and also provide advanced threat detection and remediation. • Know which assets are most at risk with complete context awareness • Quickly react to attacks with intelligent security automation that sets policies and hardens your defenses dynamically • Better detect evasive or suspicious activity with network and endpoint event correlation • Greatly decrease the time from detection to cleanup with retrospective security that continuously monitors for suspicious activity and behavior even after initial inspection • Ease administration and reduce complexity with unified policies that protect across the entire attack continuum 17
  • 18.
  • 19. IN ADDITION TO THE USE OF SIMPLE CONFIGURATION OF A SINGLE SYSTEM (SINGLE PACKET FILTERING ROUTER OR SINGLE GATEWAY), MORE COMPLEX CONFIGURATIONSARE POSSIBLE THREE COMMON CONFIGURATIONS
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. QUIZ: 1. The purpose of a firewall on computer networks is to - a. Prevent computers from overheating b. Prevent unwanted network connections from being made c. Allow more than 4 computers to share the same Internet connection d. Allow pictures and video to be downloaded from a camera to a computer 2. Which one of the following can be considered to be a hardware firewall? a. Router b. Hub c. Bridge d. Switch 3. Which of the following are true about Firewalls? a. Filters network traffic b. Can be either a hardware or software device c. Follows a set of rules d. All the above
  • 31. 4. Which one of the following is a key function of a firewall? a. Monitoring b. Copying c. Deleting d. Moving 5. What is "phishing? a. "Spoofed" e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords b. A type of computer virus c. An example of a strong password d. None of the above 6. What are some of the benefits of using a firewall for your LAN? a. Increased access to Instant Messaging b. Stricter access control to critical resources c. Greater security to your LAN d. Both 2 and 3
  • 32. 7. VIRUS stands for a. Very Important Resource Under Search b. Virtual Information Resource Under Resize c. Verify Interchange Result Until Source d. Very Important Record User Searched 8. Most enterprises implement several basic security measures. Which of the following is NOT a common security practice? a. Content monitoring b. Fault tolerance c. Firewall d. Intrusion-detection system
  • 33.

Editor's Notes

  1. Any request will pass through to vulnerable systems, allowing unscrupulous third parties to exploit your computers for their own gain. It monitors and restricts the information that travels between your computer and a network such as the internet. Windows firewall helps to provide a line of defense against someone who might try to access your computer over a network without your permission. It also helps block malicious software and worms and provides a means to log security events. Firewall helps to protect your computer by blocking unsolicited traffic. Unsolicited traffic is any attempt to communicate with your computer over a network connection that was not specifically requested by programs running on your computer. What is firewall? Firewalls protect a Network of Computers from being Compromised, Denial of Service and other Attacks from Hackers trying to Intrude the network from outside. A Firewall can be in the form of a Hardware or a Software on a Computer, as well. A Firewall needs to be connected to a minimum of two Network Interfaces, one which is supposed to be protected (Your Internal Network) and other which is Exposed to Attacks (Generally Internet). A Firewall can also be considered as a Gateway deployed between the two Networks.
  2. How Firewalls work? Firewall examine all the data packets passing through them to see if they meet the rules defined by the ACL (Access Control List) made by the administrator of the network. Only, If the Data Packets are allowed as per ACL, they will be Transmitted over the Connection. Firewalls generally also maintain a log of Important Activities in Inside the Network. A Network Administrator can define what is important for him and configure the Firewall to make the Logs accordingly. Firewall can filter contents on the basis of Address, Protocols, Packet attributes and State. Firewalls generally only Screen the Packet Headers.
  3. How Firewalls work? Firewall examine all the data packets passing through them to see if they meet the rules defined by the ACL (Access Control List) made by the administrator of the network. Only, If the Data Packets are allowed as per ACL, they will be Transmitted over the Connection. Firewalls generally also maintain a log of Important Activities in Inside the Network. A Network Administrator can define what is important for him and configure the Firewall to make the Logs accordingly. Firewall can filter contents on the basis of Address, Protocols, Packet attributes and State. Firewalls generally only Screen the Packet Headers.
  4. Information systems undergo a steady evolution (from small LAN`s to Internet connectivity) Strong security features for all workstations and servers not established The firewall is inserted between the premises network and the Internet Design goals: All traffic from inside to outside must pass through the firewall (physically blocking all access to the local network except via the firewall) Only authorized traffic (defined by the local security police) will be allowed to pass The firewall itself is immune to penetration (use of trusted system with a secure operating system)
  5. Proxy servers can provide additional functionality such as content caching and security by preventing direct connections from outside the network. However, this also may impact throughput capabilities and the applications they can support. Proxy firewalls are considered to be the most secure type of firewall because they prevent direct network contact with other systems. (Because a proxy firewall has its own IP address, an outside network connection will never receive packets from the sending network directly.) 
  6. It monitors all activity from the opening of a connection until it is closed. Filtering decisions are made based on both administrator-defined rules as well as context, which refers to using information from previous connections and packets belonging to the same connection. Monitors communications packets over a period of time and examines both incoming and outgoing packets. Outgoing packets that request specific types of incoming packets are tracked and only those incoming packets constituting a proper response are allowed through the firewall.
  7. Packet-filtering firewalls are very fast because there is not much logic going behind the decisions they make. They do not do any internal inspection of the traffic. They also do not store any state information. You have to manually open ports for all traffic that will flow through the firewall. Packet-filtering firewalls are considered not to be very secure. This is because they will forward any traffic that is flowing on an approved port. So there could be malicious traffic being sent, but as long as it’s on an acceptable port, it will not be blocked.
  8. A A D A A D B B