SlideShare a Scribd company logo
Firewall
-Harshali Devi
F i r e w a l l
What is a Firewall?
1
Firewall Architecture
2
Firewall:Types
3
What is a
Firewall?
Firewalls scrutinize inbound traffic based on predefined
security rules and filter traffic coming from unsecured or
suspicious sources to prevent attacks. Traffic is guarded
at a computers entry point called ports, where
information is actually exchanged with external devices.
Consider an example where source address ‘198.21.1.1’
is allowed to reach destination ‘198.21.2.1’ over port
22. Here, port 22 is looked at as a point of data
exchange, and therefore firewall safeguards it against
intruder attacks.
A firewall is defined as a cybersecurity
tool that monitors incoming and
outgoing network traffic and permits or
blocks data packets based on a set of
cybersecurity rules.
Firewall
Architecture
• Network Policy: This refers to the set of rules or
guidelines established by an organization to govern
how devices within the network communicate with
each other and with external networks.
• Advanced Authentication: Advanced authentication
mechanisms are used to verify the identity of users or
devices attempting to access the network. This can
involve various methods such as passwords,
biometrics, digital certificates, two-factor
authentication, etc.
Firewall architecture is built upon four
primary components — network policy,
advanced authentication, packet
filtering, and application gateways. Let
us look at each component in detail.
Firewall
Architecture
• Packet Filtering: Packet filtering is a fundamental
function of a firewall that involves inspecting
individual data packets as they traverse the network
and making decisions about whether to allow or
block them based on predefined rules
• Application Gateways: Application gateways, also
known as proxy servers or application-level gateways,
operate at the application layer of the OSI model and
provide additional security by inspecting and filtering
traffic based on specific applications or services.
Unlike packet filtering, which operates at the network
layer, application gateways can examine the contents
of application-layer protocols such as HTTP, FTP,
SMTP, etc., allowing for more granular control over
traffic.
Types of Firewall
Host-based Firewalls
A host-based firewall is installed on
each network node, which controls
each incoming and outgoing
packet. It is a software application
or suite of applications that come
as a part of the operating system.
Host firewall protects each host
from attacks and unauthorized
access.
Network-based Firewalls
Network firewall functions on the
network level by employing two or
more network interface cards (NICs).
In other words, these firewalls filter all
incoming and outgoing traffic across
the network by using firewall rules.
Types of Firewall
Packet filtering firewall
Packet filtering firewalls operate in
line at junction points where
devices such as routers and
switches do their work. These
firewalls don’t route packets but
compare each packet to a set of
established criteria — such as the
allowed IP addresses, packet type,
port number, and other aspects of
the packet protocol headers.
Packets that are flagged as
troublesome are dropped.
Stateful inspection
firewall
State-aware devices examine
each packet and keep track
of whether that packet is
part of an established TCP or
other network sessions. Such
provision offers more
security than packet filtering
or circuit monitoring alone
but takes a greater toll on
network performance.
Types of Firewall
Circuit-level gateway
Circuit-level gateways monitor TCP
handshakes and other network
protocol session initiation messages
across the network as they are
established between the local and
remote hosts to determine whether
the session being initiated is
legitimate, whether the remote
system is considered trusted. They
don’t inspect the packets
themselves. However, they provide a
quick way to identify malicious
content.
Types of Firewall
Next-generation firewall
(NGFW)
NGFW combines packet inspection
with stateful inspection, including a
variety of deep packet inspection,
along with other network security
systems, such as intrusion
detection/prevention, malware
filtering, and antivirus.
NGFWs integrated with deep
packet inspection (DPI) capabilities
can check data at transmission
control protocol (TCP), internet
protocol (IP), and application layers
(from top to bottom). This gives
application awareness to next-
generation firewalls, such as
context regarding which
application information is being
routed.
Types of Firewall
Application-level gateway
Application-level gateway, also known as
a proxy or a proxy firewall, combines
some of the attributes of packet filtering
firewalls with those of circuit-level
gateways. They filter packets according
to the service they are intended for
(specified by the destination port) and
certain other characteristics, such as the
HTTP request string.
Thank You
Harshali Devi
8059
TE AI&DS

More Related Content

Similar to Firewall basics - types,architecture ,defination

firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfatimagull32
 
Untitled document(2).pdf
Untitled document(2).pdfUntitled document(2).pdf
Untitled document(2).pdfhadaf44
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptxCSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptxVivekTripathi684438
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)Zara Nawaz
 
Introduction-to-the- inside -Firewall.pptx
Introduction-to-the- inside -Firewall.pptxIntroduction-to-the- inside -Firewall.pptx
Introduction-to-the- inside -Firewall.pptxpradipnothing2a
 
Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...usman butt
 
Firewall security in computer security
Firewall security in computer security Firewall security in computer security
Firewall security in computer security PawansureshNishad
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALASaikiran Panjala
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxsaad504633
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Servervinay arora
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Radhika Talaviya
 
Firewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxFirewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxShrayamManandhar
 

Similar to Firewall basics - types,architecture ,defination (20)

What are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdfWhat are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdf
 
How Does a Firewall Protect Against Hackers?
How Does a Firewall Protect Against Hackers?How Does a Firewall Protect Against Hackers?
How Does a Firewall Protect Against Hackers?
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 
Untitled document(2).pdf
Untitled document(2).pdfUntitled document(2).pdf
Untitled document(2).pdf
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall
Firewall Firewall
Firewall
 
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptxCSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
 
Introduction-to-the- inside -Firewall.pptx
Introduction-to-the- inside -Firewall.pptxIntroduction-to-the- inside -Firewall.pptx
Introduction-to-the- inside -Firewall.pptx
 
Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...Impact to it security of incorrect configuration of firewall policies and thi...
Impact to it security of incorrect configuration of firewall policies and thi...
 
Firewall security in computer security
Firewall security in computer security Firewall security in computer security
Firewall security in computer security
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Firewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxFirewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptx
 

Recently uploaded

Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industriesMuhammadTufail242431
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfPipe Restoration Solutions
 
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamKIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamDr. Radhey Shyam
 
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationDr. Radhey Shyam
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Krakówbim.edu.pl
 
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and ClusteringKIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and ClusteringDr. Radhey Shyam
 
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfRESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Peek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfPeek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfAyahmorsy
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdfKamal Acharya
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdfKamal Acharya
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGKOUSTAV SARKAR
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfKamal Acharya
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdfKamal Acharya
 
shape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptxshape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptxVishalDeshpande27
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxwendy cai
 
AI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdfAI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdfmahaffeycheryld
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf884710SadaqatAli
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfKamal Acharya
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageRCC Institute of Information Technology
 

Recently uploaded (20)

Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamKIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
 
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
 
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and ClusteringKIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
 
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfRESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
 
Peek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfPeek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdf
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
shape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptxshape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptx
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
 
AI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdfAI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdf
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 

Firewall basics - types,architecture ,defination

  • 2. F i r e w a l l What is a Firewall? 1 Firewall Architecture 2 Firewall:Types 3
  • 3. What is a Firewall? Firewalls scrutinize inbound traffic based on predefined security rules and filter traffic coming from unsecured or suspicious sources to prevent attacks. Traffic is guarded at a computers entry point called ports, where information is actually exchanged with external devices. Consider an example where source address ‘198.21.1.1’ is allowed to reach destination ‘198.21.2.1’ over port 22. Here, port 22 is looked at as a point of data exchange, and therefore firewall safeguards it against intruder attacks. A firewall is defined as a cybersecurity tool that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of cybersecurity rules.
  • 4. Firewall Architecture • Network Policy: This refers to the set of rules or guidelines established by an organization to govern how devices within the network communicate with each other and with external networks. • Advanced Authentication: Advanced authentication mechanisms are used to verify the identity of users or devices attempting to access the network. This can involve various methods such as passwords, biometrics, digital certificates, two-factor authentication, etc. Firewall architecture is built upon four primary components — network policy, advanced authentication, packet filtering, and application gateways. Let us look at each component in detail.
  • 5. Firewall Architecture • Packet Filtering: Packet filtering is a fundamental function of a firewall that involves inspecting individual data packets as they traverse the network and making decisions about whether to allow or block them based on predefined rules • Application Gateways: Application gateways, also known as proxy servers or application-level gateways, operate at the application layer of the OSI model and provide additional security by inspecting and filtering traffic based on specific applications or services. Unlike packet filtering, which operates at the network layer, application gateways can examine the contents of application-layer protocols such as HTTP, FTP, SMTP, etc., allowing for more granular control over traffic.
  • 6.
  • 7. Types of Firewall Host-based Firewalls A host-based firewall is installed on each network node, which controls each incoming and outgoing packet. It is a software application or suite of applications that come as a part of the operating system. Host firewall protects each host from attacks and unauthorized access. Network-based Firewalls Network firewall functions on the network level by employing two or more network interface cards (NICs). In other words, these firewalls filter all incoming and outgoing traffic across the network by using firewall rules.
  • 8. Types of Firewall Packet filtering firewall Packet filtering firewalls operate in line at junction points where devices such as routers and switches do their work. These firewalls don’t route packets but compare each packet to a set of established criteria — such as the allowed IP addresses, packet type, port number, and other aspects of the packet protocol headers. Packets that are flagged as troublesome are dropped. Stateful inspection firewall State-aware devices examine each packet and keep track of whether that packet is part of an established TCP or other network sessions. Such provision offers more security than packet filtering or circuit monitoring alone but takes a greater toll on network performance.
  • 9. Types of Firewall Circuit-level gateway Circuit-level gateways monitor TCP handshakes and other network protocol session initiation messages across the network as they are established between the local and remote hosts to determine whether the session being initiated is legitimate, whether the remote system is considered trusted. They don’t inspect the packets themselves. However, they provide a quick way to identify malicious content.
  • 10. Types of Firewall Next-generation firewall (NGFW) NGFW combines packet inspection with stateful inspection, including a variety of deep packet inspection, along with other network security systems, such as intrusion detection/prevention, malware filtering, and antivirus. NGFWs integrated with deep packet inspection (DPI) capabilities can check data at transmission control protocol (TCP), internet protocol (IP), and application layers (from top to bottom). This gives application awareness to next- generation firewalls, such as context regarding which application information is being routed.
  • 11. Types of Firewall Application-level gateway Application-level gateway, also known as a proxy or a proxy firewall, combines some of the attributes of packet filtering firewalls with those of circuit-level gateways. They filter packets according to the service they are intended for (specified by the destination port) and certain other characteristics, such as the HTTP request string.