SlideShare a Scribd company logo
1 of 19
PRESENTATION Fire Wall
PRESENTED BY:
Hasnain Ali Khan
BS- Computer Sciences
Arid Agriculture University Rawalpindi
FIRE WALL
Firewall is device that provides secure connectivity
between
networks(internal/external).
FIRE WALL
A firewall may be a
hardware, software or a
combination of both that
is used to prevent
unauthorized program or
internet users from
accessing a private
network or a single
computer.
All message entering or
leaving the intranet pass
through the firewall,
which examines each
message & blocks those
that do not meet the
specified security criteria.
WHY NEED OF FIREWALL?
To protect confidential
information from those
who do not explicitly need
to access it.
To protect our network &
its resources from
malicious users &
accidents that originate
outside of our network.
TYPES OF FIRE WALL
1. Hardware firewall
2. Software firewall
HARDWARE FIRE WALL
It is a physical device.
It can be installed
between the modem and
computer.
It can be incorporated
into a broadband router
being used to share the
internet connection.
Protect an entire network.
Usually more expensive,
header to configure
E.g.- Cisco pix, netscreen
, watchfuard etc.
HARDWARE FIREWALL
ADVANTAGES
Uses very little system resources.
More secure
Enhanced security control
Dedicated hardware firewalls are typically more
reliable
Easy to disable or remove
Work independently of associated computer system.
SOFTWARE FIRE WALL
It is a software application.
It is installed onto the computer system that you wish
to protect .
Protect a single computer
This is usually the computer with modem attached to
it.
Usually less expensive, easier to configure
E.g.- Norton internet security, McAfee internet security
etc.
SOFTWARE FIREWALL
ADVANTAGES
Considerably cheaper or even free.
Simple to install and upgrade
Requires no physical changes to hardware or network
Ideal for home/family use
Takes up no physical space.
FIREWALL TECHNIQUES
1. Packet filter
2. Application gateway/proxy server/proxy application
gateway
3. Circuit-level gateway
4. Bastion host
PACKET FILTER
It looks at each packet entering or leaving the
network,
Accepts or rejects it based on user-defined rules.
Packet filtering is fairly effective & transparent to
users, but it is difficult to configure.
APPLICATION GATEWAY/PROXY
SERVER/PROXY APPLICATION
GATEWAY
In such type of firewall remote host or network can
interact only with proxy server, proxy server is
responsible for hiding the details of the internal
network i.e. internet.
Users uses TCP/IP application, such as FTP & Telnet
servers.
CIRCUIT-LEVEL GATEWAY
It is a stand alone application.
It does not permit end-to-end TCP connection. It sets up 2 TCP
connection:-
• Between itself and a TCP user on an inner host.
• Between itself and a TCP user on an outer host.
BASTION HOST
Bastion host is a special purpose computer on a
network specifically designed and configured to
withstand attacks.
It generally hosts a single application, provides
platform for application gateway and circuit-level
gateway.
It supports limited/specific applications to reduce the
threat to the computer.
Include application-Telnet, SMTP, FTP
THANK YOU… 

More Related Content

What's hot

Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefitsAnthony Daniel
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technologySaumya Ranjan Behura
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...Mike Maurer
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015mauimarketing
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewallsrajakhurram
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix FirewallSouvik Santra
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configurationSoban Ahmad
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 

What's hot (20)

Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technology
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
 
Firewalls
FirewallsFirewalls
Firewalls
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
 
محمد
محمدمحمد
محمد
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 

Similar to Presentation on Firewalls: Types, Techniques and Why They Are Needed

FireWall
FireWallFireWall
FireWallrubal_9
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
Windows firewall
Windows firewallWindows firewall
Windows firewallVC Infotech
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdfImXaib
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET Journal
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...Pranav Gontalwar
 
Week14 Presentation
Week14 PresentationWeek14 Presentation
Week14 Presentationgueste7bef1
 
Firewall
FirewallFirewall
FirewallApo
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...ams1ams11
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfjibinsh
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinalmordannon
 

Similar to Presentation on Firewalls: Types, Techniques and Why They Are Needed (20)

FireWall
FireWallFireWall
FireWall
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate Environment
 
Firewall
FirewallFirewall
Firewall
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
 
Week14 Presentation
Week14 PresentationWeek14 Presentation
Week14 Presentation
 
Kerberos
KerberosKerberos
Kerberos
 
Firewall
FirewallFirewall
Firewall
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdf
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 

Recently uploaded

The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 

Recently uploaded (20)

Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 

Presentation on Firewalls: Types, Techniques and Why They Are Needed

  • 2. PRESENTED BY: Hasnain Ali Khan BS- Computer Sciences Arid Agriculture University Rawalpindi
  • 3. FIRE WALL Firewall is device that provides secure connectivity between networks(internal/external).
  • 4. FIRE WALL A firewall may be a hardware, software or a combination of both that is used to prevent unauthorized program or internet users from accessing a private network or a single computer. All message entering or leaving the intranet pass through the firewall, which examines each message & blocks those that do not meet the specified security criteria.
  • 5. WHY NEED OF FIREWALL? To protect confidential information from those who do not explicitly need to access it. To protect our network & its resources from malicious users & accidents that originate outside of our network.
  • 6. TYPES OF FIRE WALL 1. Hardware firewall 2. Software firewall
  • 7. HARDWARE FIRE WALL It is a physical device. It can be installed between the modem and computer. It can be incorporated into a broadband router being used to share the internet connection. Protect an entire network. Usually more expensive, header to configure E.g.- Cisco pix, netscreen , watchfuard etc.
  • 8. HARDWARE FIREWALL ADVANTAGES Uses very little system resources. More secure Enhanced security control Dedicated hardware firewalls are typically more reliable Easy to disable or remove Work independently of associated computer system.
  • 9. SOFTWARE FIRE WALL It is a software application. It is installed onto the computer system that you wish to protect . Protect a single computer This is usually the computer with modem attached to it. Usually less expensive, easier to configure E.g.- Norton internet security, McAfee internet security etc.
  • 10. SOFTWARE FIREWALL ADVANTAGES Considerably cheaper or even free. Simple to install and upgrade Requires no physical changes to hardware or network Ideal for home/family use Takes up no physical space.
  • 11. FIREWALL TECHNIQUES 1. Packet filter 2. Application gateway/proxy server/proxy application gateway 3. Circuit-level gateway 4. Bastion host
  • 12. PACKET FILTER It looks at each packet entering or leaving the network, Accepts or rejects it based on user-defined rules. Packet filtering is fairly effective & transparent to users, but it is difficult to configure.
  • 13.
  • 14. APPLICATION GATEWAY/PROXY SERVER/PROXY APPLICATION GATEWAY In such type of firewall remote host or network can interact only with proxy server, proxy server is responsible for hiding the details of the internal network i.e. internet. Users uses TCP/IP application, such as FTP & Telnet servers.
  • 15.
  • 16. CIRCUIT-LEVEL GATEWAY It is a stand alone application. It does not permit end-to-end TCP connection. It sets up 2 TCP connection:- • Between itself and a TCP user on an inner host. • Between itself and a TCP user on an outer host.
  • 17. BASTION HOST Bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks. It generally hosts a single application, provides platform for application gateway and circuit-level gateway. It supports limited/specific applications to reduce the threat to the computer. Include application-Telnet, SMTP, FTP
  • 18.