3. The internet has made large amount of information
available to average computer users at home, in
business and education.
For many people having access to this information is
no longer an advantage; it is essential.
Therefore, security of network is the main criteria here
and firewall provides this security.
4.
5. •Firewall is a network security device that observes and filters
incoming and outgoing network traffic, adhering to the security
policies defined by an organization. Essentially, it acts as a
protective wall between a private internal network and the
public Internet.
•Fencing your property protects your house and keeps
trespassers at bay; similarly, firewalls are used to secure a
computer network. Firewalls are network security systems that
prevent unauthorized access to a network. It can be a hardware
or software unit that filters the incoming and outgoing traffic
within a private network, according to a set of rules to spot and
prevent cyberattacks.
Firewalls are used in enterprise and personal settings. They are
a vital component of network security. Most operating systems
have a basic built-in firewall. However, using a third-party
firewall application provides better protection
8. Stateful firewalls (performs Stateful Packet
Inspection) are able to determine the
connection state of packet, unlike Packet
filtering firewall, which makes it more efficient.
It keeps track of the state of networks
connection travelling across it, So the filtering
decisions would not only be based on defined
rules, but also on packet’s history in the state
table.
Packet filtering firewall is used to control
network access by monitoring outgoing and
incoming packets and allowing them to pass or
stop based on source and destination IP address,
protocols, and ports. It analyses traffic at the
transport protocol layer Only It can allow or
deny the packets based on unique packet
headers. Packet filtering firewall maintains a
filtering table that decides whether the packet
will be forwarded or discarded.
9. Application layer firewall can inspect
and filter the packets on any OSI layer,
up to the application layer. It has the
ability to block specific content, also
recognize when certain application
and protocols (like HTTP, FTP) are
being misused. In other words,
Application layer firewalls are hosts
that run proxy servers.
Next Generation Firewalls are being
deployed these days to stop modern
security breaches like advance malware
attacks and application-layer attacks.
NGFW consists of Deep Packet Inspection,
Application Inspection, SSL/SSH
inspection and many functionalities to
protect the network from these modern
threats.
10.
11. A vision needs to be explained further
and in detail because it is one of the
main points about your future
projection and your best goal. The
company perspective can be seen in
this session.
A packet filtering firewall is the most basic type of firewall. It acts like a management
program that monitors network traffic and filters incoming packets based on configured
security rules. These firewalls are designed to block network traffic IP protocols, an IP
address, and a port number if a data packet does not match the established rule-set.
Circuit-level gateways are another simplified type of firewall that can be easily configured to
allow or block traffic without consuming significant computing resources.These types of
firewalls typically operate at the session-level of the OSI model by verifying TCP
(Transmission Control Protocol) connections and sessions. Circuit-level gateways are
designed to ensure that the established sessions are protected.
12. Proxy firewalls operate at the application layer as an intermediate device to filter incoming traffic between two
end systems (e.g., network and traffic systems). That is why these firewalls are called 'Application-level
Gateways'.Unlike basic firewalls, these firewalls transfer requests from clients pretending to be original clients on
the web-server. This protects the client's identity and other suspicious information, keeping the network safe
from potential attacks.
This type of firewall is usually defined as a security device combining the features and functionalities of other
firewalls. These firewalls include deep-packet inspection (DPI), surface-level packet inspection, and TCP
handshake testing, etc.NGFW includes higher levels of security than packet-filtering and stateful inspection
firewalls. Unlike traditional firewalls, NGFW monitors the entire transaction of data, including packet headers,
packet contents, and sources. NGFWs are designed in such a way that they can prevent more sophisticated and
evolving security threats such as malware attacks, external threats, and advance intrusion.
13. Cloud firewalls are typically maintained and run on the Internet by third-party vendors.
This type of firewall is considered similar to a proxy firewall. The reason for this is the
use of cloud firewalls as proxy servers. However, they are configured based on
requirements.
Stateful multi-layer inspection firewalls include both packet inspection technology
and TCP handshake verification, making SMLI firewalls superior to packet-filtering
firewalls or circuit-level gateways. Additionally, these types of firewalls keep track of
the status of established connections.
14. •A firewall filters data entering your network. It analyzes that data by checking the sender’s address, the
application the data is meant for, and the contents of the data
•By combining these defined data points, a firewall can tell what’s harmful and what isn’t. Then the
firewall opens or closes the network gate accordingly.
•Firewalls filter the network traffic within a private network, it analyses which traffic should be allowed
or restricted.
•Think of the firewall like a gatekeeper at your computer’s entry point which only allows trusted sources
or IP addresses to enter your network.
•A firewall welcomes only those incoming traffic that has been configured to accept it. It distinguishes
between good and malicious traffic and either allows or blocks specific data packets on pre-established
security.
A packet filtering firewall controls data flow and form a network. It allows or blocks the data transfer on
the packet’s source address the destination address of the packet, the application protocols to transfer
the data, so on. It blocks traffic coming from suspicious sources to prevent cyber attacks.
15. • A firewall protects company’s entire IT infrastructure.
• A firewall helps tp block access to unapproved websites.
• Firewall helps to prevent unauthorized remote access.
• A firewall can protect business from Malicious code.
• We can use firewall to provide VPN Services.
16. • Monitors Network Traffic: The firewall monitor the data from where it comes in and out
of your system. It give faster response time and the ability to mange large traffic
loads. A well –equipped and trained team can provide security to your system based
on incoming and outgoing data from the firewalls.
• Promotes Privacy and security : Firewalls may play a vital role in corporate security
management. It stop unauthorized user from accessing a private network that is
linked to the Internet.
• Stops virus attacks: Virus attacks are very dangerous for the computer system, and
they could close down all digital operations quickly. Millions of new threats develop
everyday, and it becomes important to pull our guard strong. Firewalls serve an
important blockade against malicious programs and spyware. It secures your system
from a phishing attack. It helps your data safe from the external.
17. • Complexity: Setting up and keeping up a firewall can be time-consuming and difficult, especially
for bigger networks or companies with a wide variety of users and devices.
• Limited adaptability: Because firewalls are frequently rule-based, they might not be able to
respond to fresh security threats.
• Performance impact: Network performance can be significantly impacted by firewalls,
particularly if they are set up to analyze or manage a lot of traffic.
• Limited scalability: Because firewalls are only able to secure one network, businesses that have
several networks must deploy many firewalls, which can be expensive.
• Limited VPN support: Some firewalls might not allow complex VPN features like split tunneling,
which could restrict the experience of a remote worker.
• Cost: Firewall cost depends upon the type of installation. Hardware Firewall is more expensive
than software firewall because for the installation, hardware firewall requires an expert IT
professional, and its maintenance is also costly.
18. • Corporate Network: Many businesses employ firewalls to guard against unwanted access and other security risk on
their corporate networks. These firewalls can be set up to only authorised users to access particular resources or
service and to prevent traffic from particular IP addresses or networks.
• Government organizations: Government organizations frequently employ firewalls to safeguard sensitive data and to
adhere to rules like HIPAA or PCI-DSS. They might make use of cutting-edge firewalls like Next-generation firewalls
(NGFW), which can detect and stop intrusions as well as manage access to particular data and apps.
• Service providers: Firewalls are used by service providers to safeguard their networks and the data of their clients,
including ISPs, cloud service providers, and hosting firms. They might make use of firewalls that accommodate
enormous volumes of traffic and support advanced features such as VPN and load balancing.
• Small enterprises: Small firms may use firewalls to separate their internal networks, restrict access to specific
resources or applications, and defend their networks from external threats.
• Networks at home: To guard against unwanted access and other security risks, many home users employ firewalls. A
firewall that many routers have built in can be set up to block incoming traffic and restrict access to the network.
• Industrial Control Systems (ICS): Firewalls are used to safeguard industrial control systems against illegal access
and cyberattacks in many vital infrastructures, including power plants, water treatment facilities, and transportation
systems.
19. One of the best thing about firewall
from a security standpoint is that it
stops anyone from outside from
logging into a computer within the
private network.
While this is a big deal for
businesses,most home networks will
probably not be threatened in this
manner. still, putting a firewall in place
provides some peace of mind.