SlideShare a Scribd company logo
1 of 21
INFORMATION TECHNOLOGY
PRESENTED BY:
ANUSHREE SRIVASTVA MBA/10092/3
SWET BHAGAT MBA/10088/23
KUMARI AMISHA ASHOK MBA/10097/23
ROHIT MUNDRI MBA/10090/23
PUJA KUMARI MBA/10108/23
ADITYA APRESH MBA/10106/23
SHYAMA SAHU MBA/10083/23
KUNDAN SINGH MBA/10119/23
SHREYA BANARJEE MBA/10144/23
INTRODUCTION
WHAT IS FIREWALL?
HISTORY
GENERATION OF FIREWALL
TYPES OF FIREWALL
HOW DOES A FIREWALL WORK?
NEED OF FIREWALL
ADVANTAGE
DISADVANTAGES
REAL - TIME APPLICATION FIREWALL
CONCLUSION
The internet has made large amount of information
available to average computer users at home, in
business and education.
For many people having access to this information is
no longer an advantage; it is essential.
Therefore, security of network is the main criteria here
and firewall provides this security.
•Firewall is a network security device that observes and filters
incoming and outgoing network traffic, adhering to the security
policies defined by an organization. Essentially, it acts as a
protective wall between a private internal network and the
public Internet.
•Fencing your property protects your house and keeps
trespassers at bay; similarly, firewalls are used to secure a
computer network. Firewalls are network security systems that
prevent unauthorized access to a network. It can be a hardware
or software unit that filters the incoming and outgoing traffic
within a private network, according to a set of rules to spot and
prevent cyberattacks.
Firewalls are used in enterprise and personal settings. They are
a vital component of network security. Most operating systems
have a basic built-in firewall. However, using a third-party
firewall application provides better protection
PACKET
FIREWALL
STATEFUL
FIREWLL
APPLICATION
FIREWLL
NEXT
GNERATION
FIREWALL
Stateful firewalls (performs Stateful Packet
Inspection) are able to determine the
connection state of packet, unlike Packet
filtering firewall, which makes it more efficient.
It keeps track of the state of networks
connection travelling across it, So the filtering
decisions would not only be based on defined
rules, but also on packet’s history in the state
table.
Packet filtering firewall is used to control
network access by monitoring outgoing and
incoming packets and allowing them to pass or
stop based on source and destination IP address,
protocols, and ports. It analyses traffic at the
transport protocol layer Only It can allow or
deny the packets based on unique packet
headers. Packet filtering firewall maintains a
filtering table that decides whether the packet
will be forwarded or discarded.
Application layer firewall can inspect
and filter the packets on any OSI layer,
up to the application layer. It has the
ability to block specific content, also
recognize when certain application
and protocols (like HTTP, FTP) are
being misused. In other words,
Application layer firewalls are hosts
that run proxy servers.
Next Generation Firewalls are being
deployed these days to stop modern
security breaches like advance malware
attacks and application-layer attacks.
NGFW consists of Deep Packet Inspection,
Application Inspection, SSL/SSH
inspection and many functionalities to
protect the network from these modern
threats.
A vision needs to be explained further
and in detail because it is one of the
main points about your future
projection and your best goal. The
company perspective can be seen in
this session.
A packet filtering firewall is the most basic type of firewall. It acts like a management
program that monitors network traffic and filters incoming packets based on configured
security rules. These firewalls are designed to block network traffic IP protocols, an IP
address, and a port number if a data packet does not match the established rule-set.
Circuit-level gateways are another simplified type of firewall that can be easily configured to
allow or block traffic without consuming significant computing resources.These types of
firewalls typically operate at the session-level of the OSI model by verifying TCP
(Transmission Control Protocol) connections and sessions. Circuit-level gateways are
designed to ensure that the established sessions are protected.
Proxy firewalls operate at the application layer as an intermediate device to filter incoming traffic between two
end systems (e.g., network and traffic systems). That is why these firewalls are called 'Application-level
Gateways'.Unlike basic firewalls, these firewalls transfer requests from clients pretending to be original clients on
the web-server. This protects the client's identity and other suspicious information, keeping the network safe
from potential attacks.
This type of firewall is usually defined as a security device combining the features and functionalities of other
firewalls. These firewalls include deep-packet inspection (DPI), surface-level packet inspection, and TCP
handshake testing, etc.NGFW includes higher levels of security than packet-filtering and stateful inspection
firewalls. Unlike traditional firewalls, NGFW monitors the entire transaction of data, including packet headers,
packet contents, and sources. NGFWs are designed in such a way that they can prevent more sophisticated and
evolving security threats such as malware attacks, external threats, and advance intrusion.
Cloud firewalls are typically maintained and run on the Internet by third-party vendors.
This type of firewall is considered similar to a proxy firewall. The reason for this is the
use of cloud firewalls as proxy servers. However, they are configured based on
requirements.
Stateful multi-layer inspection firewalls include both packet inspection technology
and TCP handshake verification, making SMLI firewalls superior to packet-filtering
firewalls or circuit-level gateways. Additionally, these types of firewalls keep track of
the status of established connections.
•A firewall filters data entering your network. It analyzes that data by checking the sender’s address, the
application the data is meant for, and the contents of the data
•By combining these defined data points, a firewall can tell what’s harmful and what isn’t. Then the
firewall opens or closes the network gate accordingly.
•Firewalls filter the network traffic within a private network, it analyses which traffic should be allowed
or restricted.
•Think of the firewall like a gatekeeper at your computer’s entry point which only allows trusted sources
or IP addresses to enter your network.
•A firewall welcomes only those incoming traffic that has been configured to accept it. It distinguishes
between good and malicious traffic and either allows or blocks specific data packets on pre-established
security.
A packet filtering firewall controls data flow and form a network. It allows or blocks the data transfer on
the packet’s source address the destination address of the packet, the application protocols to transfer
the data, so on. It blocks traffic coming from suspicious sources to prevent cyber attacks.
• A firewall protects company’s entire IT infrastructure.
• A firewall helps tp block access to unapproved websites.
• Firewall helps to prevent unauthorized remote access.
• A firewall can protect business from Malicious code.
• We can use firewall to provide VPN Services.
• Monitors Network Traffic: The firewall monitor the data from where it comes in and out
of your system. It give faster response time and the ability to mange large traffic
loads. A well –equipped and trained team can provide security to your system based
on incoming and outgoing data from the firewalls.
• Promotes Privacy and security : Firewalls may play a vital role in corporate security
management. It stop unauthorized user from accessing a private network that is
linked to the Internet.
• Stops virus attacks: Virus attacks are very dangerous for the computer system, and
they could close down all digital operations quickly. Millions of new threats develop
everyday, and it becomes important to pull our guard strong. Firewalls serve an
important blockade against malicious programs and spyware. It secures your system
from a phishing attack. It helps your data safe from the external.
• Complexity: Setting up and keeping up a firewall can be time-consuming and difficult, especially
for bigger networks or companies with a wide variety of users and devices.
• Limited adaptability: Because firewalls are frequently rule-based, they might not be able to
respond to fresh security threats.
• Performance impact: Network performance can be significantly impacted by firewalls,
particularly if they are set up to analyze or manage a lot of traffic.
• Limited scalability: Because firewalls are only able to secure one network, businesses that have
several networks must deploy many firewalls, which can be expensive.
• Limited VPN support: Some firewalls might not allow complex VPN features like split tunneling,
which could restrict the experience of a remote worker.
• Cost: Firewall cost depends upon the type of installation. Hardware Firewall is more expensive
than software firewall because for the installation, hardware firewall requires an expert IT
professional, and its maintenance is also costly.
• Corporate Network: Many businesses employ firewalls to guard against unwanted access and other security risk on
their corporate networks. These firewalls can be set up to only authorised users to access particular resources or
service and to prevent traffic from particular IP addresses or networks.
• Government organizations: Government organizations frequently employ firewalls to safeguard sensitive data and to
adhere to rules like HIPAA or PCI-DSS. They might make use of cutting-edge firewalls like Next-generation firewalls
(NGFW), which can detect and stop intrusions as well as manage access to particular data and apps.
• Service providers: Firewalls are used by service providers to safeguard their networks and the data of their clients,
including ISPs, cloud service providers, and hosting firms. They might make use of firewalls that accommodate
enormous volumes of traffic and support advanced features such as VPN and load balancing.
• Small enterprises: Small firms may use firewalls to separate their internal networks, restrict access to specific
resources or applications, and defend their networks from external threats.
• Networks at home: To guard against unwanted access and other security risks, many home users employ firewalls. A
firewall that many routers have built in can be set up to block incoming traffic and restrict access to the network.
• Industrial Control Systems (ICS): Firewalls are used to safeguard industrial control systems against illegal access
and cyberattacks in many vital infrastructures, including power plants, water treatment facilities, and transportation
systems.
One of the best thing about firewall
from a security standpoint is that it
stops anyone from outside from
logging into a computer within the
private network.
While this is a big deal for
businesses,most home networks will
probably not be threatened in this
manner. still, putting a firewall in place
provides some peace of mind.
https://www.fortinet.com/it/resources/cyberglossary/benefits-of-firewall
https://www.geeksforgeeks.org/introduction-of-firewall-in-computer-
network/
https://www.javatpoint.com/types-of-firewall
https://www.kaspersky.com/resource-center/definitions/firewall
firewall as a security measure (1)-1.pptx

More Related Content

Similar to firewall as a security measure (1)-1.pptx

Similar to firewall as a security measure (1)-1.pptx (20)

Note8
Note8Note8
Note8
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
What are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdfWhat are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdf
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Firewall
FirewallFirewall
Firewall
 
Ch20 book
Ch20 bookCh20 book
Ch20 book
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
 
Cr32585591
Cr32585591Cr32585591
Cr32585591
 
Firewall
FirewallFirewall
Firewall
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Firewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxFirewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptx
 
Firewall
FirewallFirewall
Firewall
 

Recently uploaded

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

firewall as a security measure (1)-1.pptx

  • 1. INFORMATION TECHNOLOGY PRESENTED BY: ANUSHREE SRIVASTVA MBA/10092/3 SWET BHAGAT MBA/10088/23 KUMARI AMISHA ASHOK MBA/10097/23 ROHIT MUNDRI MBA/10090/23 PUJA KUMARI MBA/10108/23 ADITYA APRESH MBA/10106/23 SHYAMA SAHU MBA/10083/23 KUNDAN SINGH MBA/10119/23 SHREYA BANARJEE MBA/10144/23
  • 2. INTRODUCTION WHAT IS FIREWALL? HISTORY GENERATION OF FIREWALL TYPES OF FIREWALL HOW DOES A FIREWALL WORK? NEED OF FIREWALL ADVANTAGE DISADVANTAGES REAL - TIME APPLICATION FIREWALL CONCLUSION
  • 3. The internet has made large amount of information available to average computer users at home, in business and education. For many people having access to this information is no longer an advantage; it is essential. Therefore, security of network is the main criteria here and firewall provides this security.
  • 4.
  • 5. •Firewall is a network security device that observes and filters incoming and outgoing network traffic, adhering to the security policies defined by an organization. Essentially, it acts as a protective wall between a private internal network and the public Internet. •Fencing your property protects your house and keeps trespassers at bay; similarly, firewalls are used to secure a computer network. Firewalls are network security systems that prevent unauthorized access to a network. It can be a hardware or software unit that filters the incoming and outgoing traffic within a private network, according to a set of rules to spot and prevent cyberattacks. Firewalls are used in enterprise and personal settings. They are a vital component of network security. Most operating systems have a basic built-in firewall. However, using a third-party firewall application provides better protection
  • 6.
  • 8. Stateful firewalls (performs Stateful Packet Inspection) are able to determine the connection state of packet, unlike Packet filtering firewall, which makes it more efficient. It keeps track of the state of networks connection travelling across it, So the filtering decisions would not only be based on defined rules, but also on packet’s history in the state table. Packet filtering firewall is used to control network access by monitoring outgoing and incoming packets and allowing them to pass or stop based on source and destination IP address, protocols, and ports. It analyses traffic at the transport protocol layer Only It can allow or deny the packets based on unique packet headers. Packet filtering firewall maintains a filtering table that decides whether the packet will be forwarded or discarded.
  • 9. Application layer firewall can inspect and filter the packets on any OSI layer, up to the application layer. It has the ability to block specific content, also recognize when certain application and protocols (like HTTP, FTP) are being misused. In other words, Application layer firewalls are hosts that run proxy servers. Next Generation Firewalls are being deployed these days to stop modern security breaches like advance malware attacks and application-layer attacks. NGFW consists of Deep Packet Inspection, Application Inspection, SSL/SSH inspection and many functionalities to protect the network from these modern threats.
  • 10.
  • 11. A vision needs to be explained further and in detail because it is one of the main points about your future projection and your best goal. The company perspective can be seen in this session. A packet filtering firewall is the most basic type of firewall. It acts like a management program that monitors network traffic and filters incoming packets based on configured security rules. These firewalls are designed to block network traffic IP protocols, an IP address, and a port number if a data packet does not match the established rule-set. Circuit-level gateways are another simplified type of firewall that can be easily configured to allow or block traffic without consuming significant computing resources.These types of firewalls typically operate at the session-level of the OSI model by verifying TCP (Transmission Control Protocol) connections and sessions. Circuit-level gateways are designed to ensure that the established sessions are protected.
  • 12. Proxy firewalls operate at the application layer as an intermediate device to filter incoming traffic between two end systems (e.g., network and traffic systems). That is why these firewalls are called 'Application-level Gateways'.Unlike basic firewalls, these firewalls transfer requests from clients pretending to be original clients on the web-server. This protects the client's identity and other suspicious information, keeping the network safe from potential attacks. This type of firewall is usually defined as a security device combining the features and functionalities of other firewalls. These firewalls include deep-packet inspection (DPI), surface-level packet inspection, and TCP handshake testing, etc.NGFW includes higher levels of security than packet-filtering and stateful inspection firewalls. Unlike traditional firewalls, NGFW monitors the entire transaction of data, including packet headers, packet contents, and sources. NGFWs are designed in such a way that they can prevent more sophisticated and evolving security threats such as malware attacks, external threats, and advance intrusion.
  • 13. Cloud firewalls are typically maintained and run on the Internet by third-party vendors. This type of firewall is considered similar to a proxy firewall. The reason for this is the use of cloud firewalls as proxy servers. However, they are configured based on requirements. Stateful multi-layer inspection firewalls include both packet inspection technology and TCP handshake verification, making SMLI firewalls superior to packet-filtering firewalls or circuit-level gateways. Additionally, these types of firewalls keep track of the status of established connections.
  • 14. •A firewall filters data entering your network. It analyzes that data by checking the sender’s address, the application the data is meant for, and the contents of the data •By combining these defined data points, a firewall can tell what’s harmful and what isn’t. Then the firewall opens or closes the network gate accordingly. •Firewalls filter the network traffic within a private network, it analyses which traffic should be allowed or restricted. •Think of the firewall like a gatekeeper at your computer’s entry point which only allows trusted sources or IP addresses to enter your network. •A firewall welcomes only those incoming traffic that has been configured to accept it. It distinguishes between good and malicious traffic and either allows or blocks specific data packets on pre-established security. A packet filtering firewall controls data flow and form a network. It allows or blocks the data transfer on the packet’s source address the destination address of the packet, the application protocols to transfer the data, so on. It blocks traffic coming from suspicious sources to prevent cyber attacks.
  • 15. • A firewall protects company’s entire IT infrastructure. • A firewall helps tp block access to unapproved websites. • Firewall helps to prevent unauthorized remote access. • A firewall can protect business from Malicious code. • We can use firewall to provide VPN Services.
  • 16. • Monitors Network Traffic: The firewall monitor the data from where it comes in and out of your system. It give faster response time and the ability to mange large traffic loads. A well –equipped and trained team can provide security to your system based on incoming and outgoing data from the firewalls. • Promotes Privacy and security : Firewalls may play a vital role in corporate security management. It stop unauthorized user from accessing a private network that is linked to the Internet. • Stops virus attacks: Virus attacks are very dangerous for the computer system, and they could close down all digital operations quickly. Millions of new threats develop everyday, and it becomes important to pull our guard strong. Firewalls serve an important blockade against malicious programs and spyware. It secures your system from a phishing attack. It helps your data safe from the external.
  • 17. • Complexity: Setting up and keeping up a firewall can be time-consuming and difficult, especially for bigger networks or companies with a wide variety of users and devices. • Limited adaptability: Because firewalls are frequently rule-based, they might not be able to respond to fresh security threats. • Performance impact: Network performance can be significantly impacted by firewalls, particularly if they are set up to analyze or manage a lot of traffic. • Limited scalability: Because firewalls are only able to secure one network, businesses that have several networks must deploy many firewalls, which can be expensive. • Limited VPN support: Some firewalls might not allow complex VPN features like split tunneling, which could restrict the experience of a remote worker. • Cost: Firewall cost depends upon the type of installation. Hardware Firewall is more expensive than software firewall because for the installation, hardware firewall requires an expert IT professional, and its maintenance is also costly.
  • 18. • Corporate Network: Many businesses employ firewalls to guard against unwanted access and other security risk on their corporate networks. These firewalls can be set up to only authorised users to access particular resources or service and to prevent traffic from particular IP addresses or networks. • Government organizations: Government organizations frequently employ firewalls to safeguard sensitive data and to adhere to rules like HIPAA or PCI-DSS. They might make use of cutting-edge firewalls like Next-generation firewalls (NGFW), which can detect and stop intrusions as well as manage access to particular data and apps. • Service providers: Firewalls are used by service providers to safeguard their networks and the data of their clients, including ISPs, cloud service providers, and hosting firms. They might make use of firewalls that accommodate enormous volumes of traffic and support advanced features such as VPN and load balancing. • Small enterprises: Small firms may use firewalls to separate their internal networks, restrict access to specific resources or applications, and defend their networks from external threats. • Networks at home: To guard against unwanted access and other security risks, many home users employ firewalls. A firewall that many routers have built in can be set up to block incoming traffic and restrict access to the network. • Industrial Control Systems (ICS): Firewalls are used to safeguard industrial control systems against illegal access and cyberattacks in many vital infrastructures, including power plants, water treatment facilities, and transportation systems.
  • 19. One of the best thing about firewall from a security standpoint is that it stops anyone from outside from logging into a computer within the private network. While this is a big deal for businesses,most home networks will probably not be threatened in this manner. still, putting a firewall in place provides some peace of mind.