SlideShare a Scribd company logo
1 of 20
Contents
 Introduction to Firewall
 Generations of Firewall
 Types of Firewall
 Firewall Topology
 Firewall Rules
 Conclusion
 References
Introduction to Firewall
What is Firewall?
 Firewall is a network security system
that controls the incoming and
outgoing network traffic based on
applied rules.
 It establishes a barrier between a
trusted, secure internal network and
another network ( e.g., the Internet)
that is assumed not to be secure and
trusted.
Generations of Firewall
First Generation : Packet Filter
STATIC PACKET FILTERS
• One of the simplest and least
expensive forms of firewall
protection is known as static packet
filtering.
• Each packet entering or leaving the
network is checked and either
passed or rejected depending on set
of user-defined rules.
STATEFUL PACKET INSPECTION
• Within the same generation of static
packet filtering firewalls are
firewalls known as Stateful packet
inspection.
• It examines the contents of packet
rather than just filtering them, it
consider their contents as well as
their addresses
Generations of Firewall
First Generation :
Second Generation Firewalls
PROXY SERVICES
• The next generation of firewalls
attempted to increase the level of
security between trusted and
untrusted networks.
• The Proxy program evaluates data
sent from the client and decides
which to pass on and which to drop.
Third Generation
 This new generation evolved to meet
the major requirements demanded by
corporate networks f increased
security while minimizing impact.
 The requirement of this generation of
firewalls will be more demanding due
to growing supports for VPNS ,
wireless communication , and
enhanced virus protection.
Types of Firewall
HARDWARE FIREWALLS
• Hardware firewalls can be effective
with little or no configuration, and
they can protect every machine on
local networks.
• Hardware firewall uses packet
filtering to examine the header of a
packet to determine its source and
destination.
Types of Firewall
SOFTWARE FIREWALLS
• Software firewalls are to be installed
on individual home users and you
can customize it; allowing some
control over its function and
protection features.
• It could also provide protection
against the most common Trojan
programs or e-mail worms.
Firewall Topology
SCREENED SUBNET
• This architecture uses a single
firewall with three network card.
• It provides a solution that allows
organizations to offer services
securely to internet users.
Firewall Topology
DUAL FIREWALLS
• In this case, the DMZ is placed
between the two firewalls.
• The use of two firewalls still allows
the organization to offer services to
Internet users through the use of a
DMZ.
Firewall Rules
 Allow : Traffic that flows
automatically because it has been
deemed.
 Block : Traffic that is blocked because
it has been deemed dangerous to your
computer.
 Ask : Ask the user whether or not the
traffic is allowed to pass through.
How Firewalls Work
 IP addresses : A typical IP address
looks like: 216.27.61.137.
 Domain Names : A company might
lock all access to certain domain
names or allow access only to specific
domain names.
 Ports : If server machine is running a
Web server and an FTP server , the
web server would be on port 80 and
FTP on 21 port.
WHAT FIREWALL CAN’T DO
 Can’t protect you against malicious
insiders.
 Can’t protect you against connections
that won’t go through it.
 Can’t protect you against completely
new threat.
 Can’t protect against viruses.
Some Good Firewalls
ZoneAlarm Firewall
Comodo Firewall
Tinywall
Conclusion
 Whatever firewall you currently use
or are considering the most important
thing is to match the product with
specific security requirements of your
organization.
References
 www.wikipedia.com
 www.techrepublic.com
 www.wibopedia.com
 www.searchsecurity.techtarget.com
 www.howstuffworks.com
Queries??
Firewall (2)

More Related Content

What's hot

Structure cabling technologies for networking
Structure cabling technologies for networkingStructure cabling technologies for networking
Structure cabling technologies for networkingRumesh Hapuarachchi
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's TypesHem Pokhrel
 
Data and Computer Communication
Data and Computer CommunicationData and Computer Communication
Data and Computer CommunicationNaqeeb Ullah Kakar
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkVuz Dở Hơi
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP modelRubal Sagwal
 
Generation of mobile communication systems
Generation of mobile communication systemsGeneration of mobile communication systems
Generation of mobile communication systemsjincy-a
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureManoj Kumar
 
Network devices
Network devicesNetwork devices
Network devicesAshok R
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring toolsQaswarBosan
 
MQTT IOT Protocol Introduction
MQTT IOT Protocol IntroductionMQTT IOT Protocol Introduction
MQTT IOT Protocol IntroductionPrem Sanil
 

What's hot (20)

Structure cabling technologies for networking
Structure cabling technologies for networkingStructure cabling technologies for networking
Structure cabling technologies for networking
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
WLAN
WLANWLAN
WLAN
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
Data and Computer Communication
Data and Computer CommunicationData and Computer Communication
Data and Computer Communication
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
NETWORK INTERFACE CARD
NETWORK INTERFACE CARDNETWORK INTERFACE CARD
NETWORK INTERFACE CARD
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 
Generation of mobile communication systems
Generation of mobile communication systemsGeneration of mobile communication systems
Generation of mobile communication systems
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
 
Network devices
Network devicesNetwork devices
Network devices
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
MQTT IOT Protocol Introduction
MQTT IOT Protocol IntroductionMQTT IOT Protocol Introduction
MQTT IOT Protocol Introduction
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
X-25.ppt
X-25.pptX-25.ppt
X-25.ppt
 
Basic Concepts in Wireless LAN
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LAN
 
IPsec vpn
IPsec vpnIPsec vpn
IPsec vpn
 

Similar to Firewall (2) (20)

Firewalls
FirewallsFirewalls
Firewalls
 
Seminar
SeminarSeminar
Seminar
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall
FirewallFirewall
Firewall
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Divyanshu.pptx
Divyanshu.pptxDivyanshu.pptx
Divyanshu.pptx
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall
FirewallFirewall
Firewall
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

Firewall (2)

  • 1.
  • 2. Contents  Introduction to Firewall  Generations of Firewall  Types of Firewall  Firewall Topology  Firewall Rules  Conclusion  References
  • 3. Introduction to Firewall What is Firewall?  Firewall is a network security system that controls the incoming and outgoing network traffic based on applied rules.  It establishes a barrier between a trusted, secure internal network and another network ( e.g., the Internet) that is assumed not to be secure and trusted.
  • 4.
  • 5. Generations of Firewall First Generation : Packet Filter STATIC PACKET FILTERS • One of the simplest and least expensive forms of firewall protection is known as static packet filtering. • Each packet entering or leaving the network is checked and either passed or rejected depending on set of user-defined rules.
  • 6. STATEFUL PACKET INSPECTION • Within the same generation of static packet filtering firewalls are firewalls known as Stateful packet inspection. • It examines the contents of packet rather than just filtering them, it consider their contents as well as their addresses Generations of Firewall First Generation :
  • 7. Second Generation Firewalls PROXY SERVICES • The next generation of firewalls attempted to increase the level of security between trusted and untrusted networks. • The Proxy program evaluates data sent from the client and decides which to pass on and which to drop.
  • 8. Third Generation  This new generation evolved to meet the major requirements demanded by corporate networks f increased security while minimizing impact.  The requirement of this generation of firewalls will be more demanding due to growing supports for VPNS , wireless communication , and enhanced virus protection.
  • 9. Types of Firewall HARDWARE FIREWALLS • Hardware firewalls can be effective with little or no configuration, and they can protect every machine on local networks. • Hardware firewall uses packet filtering to examine the header of a packet to determine its source and destination.
  • 10. Types of Firewall SOFTWARE FIREWALLS • Software firewalls are to be installed on individual home users and you can customize it; allowing some control over its function and protection features. • It could also provide protection against the most common Trojan programs or e-mail worms.
  • 11. Firewall Topology SCREENED SUBNET • This architecture uses a single firewall with three network card. • It provides a solution that allows organizations to offer services securely to internet users.
  • 12. Firewall Topology DUAL FIREWALLS • In this case, the DMZ is placed between the two firewalls. • The use of two firewalls still allows the organization to offer services to Internet users through the use of a DMZ.
  • 13. Firewall Rules  Allow : Traffic that flows automatically because it has been deemed.  Block : Traffic that is blocked because it has been deemed dangerous to your computer.  Ask : Ask the user whether or not the traffic is allowed to pass through.
  • 14. How Firewalls Work  IP addresses : A typical IP address looks like: 216.27.61.137.  Domain Names : A company might lock all access to certain domain names or allow access only to specific domain names.  Ports : If server machine is running a Web server and an FTP server , the web server would be on port 80 and FTP on 21 port.
  • 15. WHAT FIREWALL CAN’T DO  Can’t protect you against malicious insiders.  Can’t protect you against connections that won’t go through it.  Can’t protect you against completely new threat.  Can’t protect against viruses.
  • 16. Some Good Firewalls ZoneAlarm Firewall Comodo Firewall Tinywall
  • 17. Conclusion  Whatever firewall you currently use or are considering the most important thing is to match the product with specific security requirements of your organization.
  • 18. References  www.wikipedia.com  www.techrepublic.com  www.wibopedia.com  www.searchsecurity.techtarget.com  www.howstuffworks.com