SlideShare a Scribd company logo
Name:- Nisarg Amin
Topic:- Firewall And Its Types
And Function
1
Firewall
• Definition: A Network Firewall is a system or group
of systems used to control access between two
networks -- a trusted network and an untrusted
network -- using pre-configured rules or filters.
2
• Firewall is device that provides secure
connectivity between networks (internal/
external).
• It is used to implement and enforce a security
policy for communication between networks.
• A firewall may be a hardware, software or a
combination of both that is used to prevent
unauthorized program or internet users from
accessing a private network or a single computer.
3
• All messages entering or leaving the intranet pass
through the firewall, which examines each message
& blocks those that do not meet the specified
security criteria.
4
Why do we need a firewall?
• To protect confidential
information from those who do
not explicitly need to access it.
• To protect our network & its
resources from malicious users
& accidents that originate
outside of our network.
5
Types of firewall
1. Hardware firewall
1. Software firewall
6
1. Hardware Firewall
• It is a physical device.
• It can be installed between the
modem and computer.
• It can be incorporated into a
broadband router being used to
share the internet connection.
• Protects an entire network.
7
• Usually more expensive, harder to configure.
• E.g.- Cisco pix, Netscreen, Watchfuard etc.
8
2. Software Firewall
• It is a software application.
• It is installed onto the computer system
that you wish to protect .
• Protects a single computer.
• This is usually the computer with
modem attached to it.
9
• Usually less expensive, easier to configure.
• E.g.- Norton internet security, MacAfee
internet security etc.
10
Types of firewall technique
• Packet filter
• Application gateway
• Circuit-level gateway
• Bastion host
11
Packet filter
• It looks at each packet entering or leaving the
network and accepts or rejects it based on
user-defined rules.
12
• Packet filtering is fairly effective & transparent
to users, but it is difficult to configure.
• In addition, it is susceptible to IP spoofing.
13
Application gateway
• In such type of firewall remote host or
network can interact only with proxy server,
proxy server is responsible for hiding the
details of the internal network i.e. intranet.
• Users uses TCP/IP application, such as FTP &
Telnet servers.
14
• This is very effective, but can impose a
performance degradation.
15
Circuit – level Firewall
• This can be a stand – alone system or it can be a
specialized functions performed by an application –
level gateway for certain applications.
• It does not permit an end – to – end TCP
connection; rather, the gateway sets two TCP
connections.
• A typical use of the circuit – level gateway is a
situation in which the system administrator trusts
the internal users. 16
• The gateway can be configured to support
application level or proxy service on
inbound connections and circuit level
functions for outbound connections.
17
Bastion Host
• Bastion host is a special purpose computer on
a network specifically designed and
configured to withstand attacks.
18
• It generally hosts a single application, provides
platform for application gateway and circuit-
level gateway.
• It supports limited/specific applications to
reduce the threat to the computer.
• Include application-Telnet, SMTP, FTP
19
What a personal firewall can do
• Stop hackers from accessing your computer.
• Protect your personal information.
• Blocks “pop up” ads and certain cookies.
• Determines which programs can access the
internet.
• Block invalid packets. 20
What a personal firewall can not do
• Cannot prevent e-mail viruses
-only an antivirus product with update definitions
can prevent e-mail viruses.
• After setting it initially, you cannot forget about it
-The firewall will require periodic updates to the rule
sets and the software itself.
21
Firewall Settings
22
Thank
you
23

More Related Content

What's hot

Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Network security ppt
Network security pptNetwork security ppt
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Naveen Kumar
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 
Computer Network
Computer NetworkComputer Network
Computer Network
AkShay Dhola
 
Intruders
IntrudersIntruders
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)ashiesh0007
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed
 
S/MIME
S/MIMES/MIME
S/MIME
maria azam
 
Data encryption
Data encryptionData encryption
Data encryption
Deepam Goyal
 
internet protocol
internet protocolinternet protocol
internet protocol
rajshreemuthiah
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt finalArushi Garg
 
cyber security notes
cyber security notescyber security notes
cyber security notes
SHIKHAJAIN163
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
Krishi Agrawal
 
Email security
Email securityEmail security
Email security
Baliram Yadav
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
Siddique Ibrahim
 

What's hot (20)

Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Network security
Network securityNetwork security
Network security
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Web Security
Web SecurityWeb Security
Web Security
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Intruders
IntrudersIntruders
Intruders
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
S/MIME
S/MIMES/MIME
S/MIME
 
Data encryption
Data encryptionData encryption
Data encryption
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt final
 
cyber security notes
cyber security notescyber security notes
cyber security notes
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
 
Email security
Email securityEmail security
Email security
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Ip address
Ip addressIp address
Ip address
 

Viewers also liked

FireWall
FireWallFireWall
FireWallrubal_9
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
What is Font and Typefaces? Explain any five font’s families in DTP. By Shobh...
What is Font and Typefaces? Explain any five font’s families in DTP. By Shobh...What is Font and Typefaces? Explain any five font’s families in DTP. By Shobh...
What is Font and Typefaces? Explain any five font’s families in DTP. By Shobh...Shobhit Jain
 
Managed firewall customer presentation
Managed firewall   customer presentationManaged firewall   customer presentation
Managed firewall customer presentationorangebusinessrussia
 
исиб
исибисиб
исиб
aepetelin
 
Экономическая эффективность ИБ. Обоснование перед руководством.
Экономическая эффективность ИБ. Обоснование перед руководством.Экономическая эффективность ИБ. Обоснование перед руководством.
Экономическая эффективность ИБ. Обоснование перед руководством.Cisco Russia
 
Экономическая эффективность использования UC
Экономическая эффективность использования UCЭкономическая эффективность использования UC
Экономическая эффективность использования UC
КРОК
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
Anthony Daniel
 
Essar oil
Essar oilEssar oil
Essar oil
Vish Chandna
 
Firewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth FirewallsFirewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth Firewalls
phanleson
 
Linkmeup. Talks about network virtaulization and SDN
Linkmeup. Talks about network virtaulization and SDNLinkmeup. Talks about network virtaulization and SDN
Linkmeup. Talks about network virtaulization and SDN
Alexander Fatin
 
Essar oil (cma)
Essar oil (cma)Essar oil (cma)
Essar oil (cma)
Mehul Rasadiya
 
The Firewall Policy Hangover: Alleviating Security Management Migraines
The Firewall Policy Hangover: Alleviating Security Management MigrainesThe Firewall Policy Hangover: Alleviating Security Management Migraines
The Firewall Policy Hangover: Alleviating Security Management Migraines
AlgoSec
 
Chapter 2 database environment
Chapter 2 database environmentChapter 2 database environment
Chapter 2 database environment>. <
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
Belsoft
 
Antonenko LinkMeUp SDN
Antonenko LinkMeUp SDNAntonenko LinkMeUp SDN
Antonenko LinkMeUp SDN
Antonenko Vitaly
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
Mundo Contact
 
SDN технологии
SDN технологииSDN технологии
SDN технологии
Alexander Shalimov
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.yhen06
 

Viewers also liked (20)

FireWall
FireWallFireWall
FireWall
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
What is Font and Typefaces? Explain any five font’s families in DTP. By Shobh...
What is Font and Typefaces? Explain any five font’s families in DTP. By Shobh...What is Font and Typefaces? Explain any five font’s families in DTP. By Shobh...
What is Font and Typefaces? Explain any five font’s families in DTP. By Shobh...
 
Managed firewall customer presentation
Managed firewall   customer presentationManaged firewall   customer presentation
Managed firewall customer presentation
 
исиб
исибисиб
исиб
 
Экономическая эффективность ИБ. Обоснование перед руководством.
Экономическая эффективность ИБ. Обоснование перед руководством.Экономическая эффективность ИБ. Обоснование перед руководством.
Экономическая эффективность ИБ. Обоснование перед руководством.
 
Экономическая эффективность использования UC
Экономическая эффективность использования UCЭкономическая эффективность использования UC
Экономическая эффективность использования UC
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 
Essar oil
Essar oilEssar oil
Essar oil
 
Firewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth FirewallsFirewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth Firewalls
 
Linkmeup. Talks about network virtaulization and SDN
Linkmeup. Talks about network virtaulization and SDNLinkmeup. Talks about network virtaulization and SDN
Linkmeup. Talks about network virtaulization and SDN
 
Essar oil (cma)
Essar oil (cma)Essar oil (cma)
Essar oil (cma)
 
The Firewall Policy Hangover: Alleviating Security Management Migraines
The Firewall Policy Hangover: Alleviating Security Management MigrainesThe Firewall Policy Hangover: Alleviating Security Management Migraines
The Firewall Policy Hangover: Alleviating Security Management Migraines
 
Chapter 2 database environment
Chapter 2 database environmentChapter 2 database environment
Chapter 2 database environment
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
Antonenko LinkMeUp SDN
Antonenko LinkMeUp SDNAntonenko LinkMeUp SDN
Antonenko LinkMeUp SDN
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 
SDN технологии
SDN технологииSDN технологии
SDN технологии
 
DBMS
DBMSDBMS
DBMS
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
 

Similar to Firewall and its types and function

Network defenses
Network defensesNetwork defenses
Network defenses
G Prachi
 
Firewall
FirewallFirewall
Firewall
Tapan Khilar
 
Seminar
SeminarSeminar
Firewalls
FirewallsFirewalls
Firewalls
vaishnavi
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
ssuser530a07
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
Divya Jyoti
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
PANKAJKUMAR2519
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
Jainam Shah
 
Firewalls And its types in cyber security
Firewalls And its types in cyber securityFirewalls And its types in cyber security
Firewalls And its types in cyber security
nikhilravi19
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
LakshayYadav46
 
Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
crisma baby mathew
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
Radhika Talaviya
 
Firewall
FirewallFirewall
Firewall
tewodrosmengste
 
Lessson 2
Lessson 2Lessson 2
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
MLG College of Learning, Inc
 
Firewall
FirewallFirewall
Firewall
Hasnain Ali
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
Karnav Rana
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 

Similar to Firewall and its types and function (20)

Network defenses
Network defensesNetwork defenses
Network defenses
 
Firewall
FirewallFirewall
Firewall
 
Seminar
SeminarSeminar
Seminar
 
Firewalls
FirewallsFirewalls
Firewalls
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Firewalls And its types in cyber security
Firewalls And its types in cyber securityFirewalls And its types in cyber security
Firewalls And its types in cyber security
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
 
Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Firewall
FirewallFirewall
Firewall
 
Lessson 2
Lessson 2Lessson 2
Lessson 2
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
 
Firewall
FirewallFirewall
Firewall
 
Divyanshu.pptx
Divyanshu.pptxDivyanshu.pptx
Divyanshu.pptx
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 

More from Nisarg Amin

Goods & services tax (gst)
Goods & services tax (gst)Goods & services tax (gst)
Goods & services tax (gst)
Nisarg Amin
 
Power system earthing
Power system earthingPower system earthing
Power system earthing
Nisarg Amin
 
Improving boiler availability
Improving boiler availabilityImproving boiler availability
Improving boiler availability
Nisarg Amin
 
Types of welding
Types of weldingTypes of welding
Types of welding
Nisarg Amin
 
Symmetrical component method for 3 phase power representation
Symmetrical component method for 3 phase power representationSymmetrical component method for 3 phase power representation
Symmetrical component method for 3 phase power representation
Nisarg Amin
 
Streamer theory
Streamer theoryStreamer theory
Streamer theory
Nisarg Amin
 
Single phase full bridge inverter
Single phase full bridge inverterSingle phase full bridge inverter
Single phase full bridge inverter
Nisarg Amin
 
Flowchart for optimal design of dc machine and transfomer
Flowchart for optimal design of dc machine and transfomerFlowchart for optimal design of dc machine and transfomer
Flowchart for optimal design of dc machine and transfomer
Nisarg Amin
 
Design of commutator and brush
Design of commutator and brushDesign of commutator and brush
Design of commutator and brush
Nisarg Amin
 
Typical a.c. supply system
Typical a.c. supply systemTypical a.c. supply system
Typical a.c. supply system
Nisarg Amin
 
Servomechanism in Control systems engineering
Servomechanism in Control systems engineeringServomechanism in Control systems engineering
Servomechanism in Control systems engineering
Nisarg Amin
 
Dynamic characteristics of thyristor
Dynamic characteristics of thyristorDynamic characteristics of thyristor
Dynamic characteristics of thyristor
Nisarg Amin
 
Digital logic devices
Digital logic devicesDigital logic devices
Digital logic devices
Nisarg Amin
 
Design of field regulators for dc shunt generators
Design of field regulators   for dc shunt generatorsDesign of field regulators   for dc shunt generators
Design of field regulators for dc shunt generators
Nisarg Amin
 
Nuclear power plant
Nuclear power plantNuclear power plant
Nuclear power plant
Nisarg Amin
 
Properties of fourier transform
Properties of fourier transformProperties of fourier transform
Properties of fourier transform
Nisarg Amin
 
Induction generator
Induction generatorInduction generator
Induction generator
Nisarg Amin
 
Engineering applications of thermodynamics
Engineering applications of thermodynamicsEngineering applications of thermodynamics
Engineering applications of thermodynamics
Nisarg Amin
 
Decimal number system
Decimal number systemDecimal number system
Decimal number system
Nisarg Amin
 
Cylindrical co ordinate system
Cylindrical co ordinate systemCylindrical co ordinate system
Cylindrical co ordinate system
Nisarg Amin
 

More from Nisarg Amin (20)

Goods & services tax (gst)
Goods & services tax (gst)Goods & services tax (gst)
Goods & services tax (gst)
 
Power system earthing
Power system earthingPower system earthing
Power system earthing
 
Improving boiler availability
Improving boiler availabilityImproving boiler availability
Improving boiler availability
 
Types of welding
Types of weldingTypes of welding
Types of welding
 
Symmetrical component method for 3 phase power representation
Symmetrical component method for 3 phase power representationSymmetrical component method for 3 phase power representation
Symmetrical component method for 3 phase power representation
 
Streamer theory
Streamer theoryStreamer theory
Streamer theory
 
Single phase full bridge inverter
Single phase full bridge inverterSingle phase full bridge inverter
Single phase full bridge inverter
 
Flowchart for optimal design of dc machine and transfomer
Flowchart for optimal design of dc machine and transfomerFlowchart for optimal design of dc machine and transfomer
Flowchart for optimal design of dc machine and transfomer
 
Design of commutator and brush
Design of commutator and brushDesign of commutator and brush
Design of commutator and brush
 
Typical a.c. supply system
Typical a.c. supply systemTypical a.c. supply system
Typical a.c. supply system
 
Servomechanism in Control systems engineering
Servomechanism in Control systems engineeringServomechanism in Control systems engineering
Servomechanism in Control systems engineering
 
Dynamic characteristics of thyristor
Dynamic characteristics of thyristorDynamic characteristics of thyristor
Dynamic characteristics of thyristor
 
Digital logic devices
Digital logic devicesDigital logic devices
Digital logic devices
 
Design of field regulators for dc shunt generators
Design of field regulators   for dc shunt generatorsDesign of field regulators   for dc shunt generators
Design of field regulators for dc shunt generators
 
Nuclear power plant
Nuclear power plantNuclear power plant
Nuclear power plant
 
Properties of fourier transform
Properties of fourier transformProperties of fourier transform
Properties of fourier transform
 
Induction generator
Induction generatorInduction generator
Induction generator
 
Engineering applications of thermodynamics
Engineering applications of thermodynamicsEngineering applications of thermodynamics
Engineering applications of thermodynamics
 
Decimal number system
Decimal number systemDecimal number system
Decimal number system
 
Cylindrical co ordinate system
Cylindrical co ordinate systemCylindrical co ordinate system
Cylindrical co ordinate system
 

Recently uploaded

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 

Recently uploaded (20)

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 

Firewall and its types and function

  • 1. Name:- Nisarg Amin Topic:- Firewall And Its Types And Function 1
  • 2. Firewall • Definition: A Network Firewall is a system or group of systems used to control access between two networks -- a trusted network and an untrusted network -- using pre-configured rules or filters. 2
  • 3. • Firewall is device that provides secure connectivity between networks (internal/ external). • It is used to implement and enforce a security policy for communication between networks. • A firewall may be a hardware, software or a combination of both that is used to prevent unauthorized program or internet users from accessing a private network or a single computer. 3
  • 4. • All messages entering or leaving the intranet pass through the firewall, which examines each message & blocks those that do not meet the specified security criteria. 4
  • 5. Why do we need a firewall? • To protect confidential information from those who do not explicitly need to access it. • To protect our network & its resources from malicious users & accidents that originate outside of our network. 5
  • 6. Types of firewall 1. Hardware firewall 1. Software firewall 6
  • 7. 1. Hardware Firewall • It is a physical device. • It can be installed between the modem and computer. • It can be incorporated into a broadband router being used to share the internet connection. • Protects an entire network. 7
  • 8. • Usually more expensive, harder to configure. • E.g.- Cisco pix, Netscreen, Watchfuard etc. 8
  • 9. 2. Software Firewall • It is a software application. • It is installed onto the computer system that you wish to protect . • Protects a single computer. • This is usually the computer with modem attached to it. 9
  • 10. • Usually less expensive, easier to configure. • E.g.- Norton internet security, MacAfee internet security etc. 10
  • 11. Types of firewall technique • Packet filter • Application gateway • Circuit-level gateway • Bastion host 11
  • 12. Packet filter • It looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. 12
  • 13. • Packet filtering is fairly effective & transparent to users, but it is difficult to configure. • In addition, it is susceptible to IP spoofing. 13
  • 14. Application gateway • In such type of firewall remote host or network can interact only with proxy server, proxy server is responsible for hiding the details of the internal network i.e. intranet. • Users uses TCP/IP application, such as FTP & Telnet servers. 14
  • 15. • This is very effective, but can impose a performance degradation. 15
  • 16. Circuit – level Firewall • This can be a stand – alone system or it can be a specialized functions performed by an application – level gateway for certain applications. • It does not permit an end – to – end TCP connection; rather, the gateway sets two TCP connections. • A typical use of the circuit – level gateway is a situation in which the system administrator trusts the internal users. 16
  • 17. • The gateway can be configured to support application level or proxy service on inbound connections and circuit level functions for outbound connections. 17
  • 18. Bastion Host • Bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks. 18
  • 19. • It generally hosts a single application, provides platform for application gateway and circuit- level gateway. • It supports limited/specific applications to reduce the threat to the computer. • Include application-Telnet, SMTP, FTP 19
  • 20. What a personal firewall can do • Stop hackers from accessing your computer. • Protect your personal information. • Blocks “pop up” ads and certain cookies. • Determines which programs can access the internet. • Block invalid packets. 20
  • 21. What a personal firewall can not do • Cannot prevent e-mail viruses -only an antivirus product with update definitions can prevent e-mail viruses. • After setting it initially, you cannot forget about it -The firewall will require periodic updates to the rule sets and the software itself. 21