SlideShare a Scribd company logo
PREPARED BY : PINA CHHATRALA 1
Milestone
 Firewall Basing
 Bastion Host
 Host – based firewall
 Personal firewall
PREPARED BY : PINA CHHATRALA 2
PREPARED BY : PINA CHHATRALA 3
Firewall Basing
Bastion Host
 A bastion host is a system identified by the firewall administrator
as a critical strong point in the network’s security.
 It serves as a platform for an application – level or circuit – level
gateway.
 Some common characteristics :
 Executes a secure version of its OS, making it a hardened
system.
 Only the services that the network administrator considers
essential are installed on the bastion host.
PREPARED BY : PINA CHHATRALA 4
Bastion Host
 Some common characteristics :
 It may require some additional authentication before user
is allowed access to the proxy services.
 Each proxy is configured to support only a subset of the
standard application’s command set.
 Each proxy is configured to allow access only to specific
host systems.
 Each proxy maintains detailed audit information by logging
all traffic.
PREPARED BY : PINA CHHATRALA 5
Bastion Host
 Some common characteristics :
 Each proxy module is a very small software package
specifically designed for network security.
 Each proxy is independent of other proxies on the bastion
host.
 A proxy generally performs no disk access other than to
read its initial configuration file.
 Each proxy runs as a nonprivilaged user in a private and
secured dictionary on the bastion host.
PREPARED BY : PINA CHHATRALA 6
Host – based Firewalls
 A host – based firewall is a software module used to secure an
individual host.
 Such modules are available in many OSs or can be provided as
an add-on packages.
 It filters and restricts the flow of packages.
 A common location for such firewalls is a server.
 Advantage :
 Filtering rules can be tailored to the host environment.
 Protection is provided independent of technology.
PREPARED BY : PINA CHHATRALA 7
Personal Firewalls
 Personal firewall controls traffic between a personal computer
or work – stations on one side and the Internet or Enterprise
network on the other side.
 These functionality can be used in the home environment and
on corporate internets.
 It is the software module on the personal computer.
 Firewall functionality can also be housed in a router that
connects all of the home computers to a DSL, cable modem, or
other internet interface.
PREPARED BY : PINA CHHATRALA 8
Personal Firewalls
 They are typically much less complex than either server – based
firewalls or stand – alone firewalls.
 The primary role of the personal firewall is to deny the
unauthorized remote access to the computer.
 The firewall can also monitor the outgoing activity is an attempt
to detect and block worms and other malware.
PREPARED BY : PINA CHHATRALA 9
PREPARED BY : PINA CHHATRALA 10

More Related Content

What's hot

Firewall ppt
Firewall pptFirewall ppt
IP Security
IP SecurityIP Security
IP Security
Keshab Nath
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
rajakhurram
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
Nisarg Amin
 
TCP/ IP
TCP/ IP TCP/ IP
Intruders
IntrudersIntruders
Types of firewall
Types of firewallTypes of firewall
Types of firewall
Pina Parmar
 
Telnet
TelnetTelnet
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
Aung Thu Rha Hein
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
Student
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
Sagar Rai
 
User authentication
User authenticationUser authentication
User authentication
CAS
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
Vivek Gandhi
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
iberrywifisecurity
 
S/MIME
S/MIMES/MIME
S/MIME
maria azam
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Firewalls
FirewallsFirewalls
Firewalls
Ram Dutt Shukla
 
IP Security
IP SecurityIP Security
IP Security
Dr.Florence Dayana
 

What's hot (20)

Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
IP Security
IP SecurityIP Security
IP Security
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Intruders
IntrudersIntruders
Intruders
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Telnet
TelnetTelnet
Telnet
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 
User authentication
User authenticationUser authentication
User authentication
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
S/MIME
S/MIMES/MIME
S/MIME
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Firewalls
FirewallsFirewalls
Firewalls
 
IP Security
IP SecurityIP Security
IP Security
 

Viewers also liked

Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
rajakhurram
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
faisalmalik
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Sweta Sharma
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
Chandan Jha
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
Vishwanath Badiger
 
Honey Pot
Honey PotHoney Pot
Honey Pot
iradarji
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Akhil Kumar
 
Vpn
VpnVpn
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
shraddha_b
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
gaurav koriya
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
stolentears
 
Firewall
FirewallFirewall
Firewall
Apo
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
david rom
 

Viewers also liked (14)

Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Honey Pot
Honey PotHoney Pot
Honey Pot
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Vpn
VpnVpn
Vpn
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Firewall
FirewallFirewall
Firewall
 
Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)Five Major Types of Intrusion Detection System (IDS)
Five Major Types of Intrusion Detection System (IDS)
 

Similar to Firewall Basing

[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
lamtran367679
 
Firewall
FirewallFirewall
Firewall
Hasnain Ali
 
Firewall
FirewallFirewall
Firewall
ilashanawaz
 
Firewalls
FirewallsFirewalls
Firewall
FirewallFirewall
Firewall
Naga Dinesh
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
fatimagull32
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
ImXaib
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
Anand992498
 
Firewall
FirewallFirewall
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdf
jibinsh
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
Mohammed Maajidh
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
Revanth71
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
VC Infotech
 
Firewall
Firewall Firewall
Firewall
FirewallFirewall
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
MLG College of Learning, Inc
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
gaurav96raj
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
PANKAJKUMAR2519
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
SakshiSolapure1
 
Firewalls
FirewallsFirewalls
Firewalls
vaishnavi
 

Similar to Firewall Basing (20)

[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
firewall.pdf
firewall.pdffirewall.pdf
firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdf
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall
Firewall Firewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
Firewalls
FirewallsFirewalls
Firewalls
 

Recently uploaded

How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 

Recently uploaded (20)

How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 

Firewall Basing

  • 1. PREPARED BY : PINA CHHATRALA 1
  • 2. Milestone  Firewall Basing  Bastion Host  Host – based firewall  Personal firewall PREPARED BY : PINA CHHATRALA 2
  • 3. PREPARED BY : PINA CHHATRALA 3 Firewall Basing
  • 4. Bastion Host  A bastion host is a system identified by the firewall administrator as a critical strong point in the network’s security.  It serves as a platform for an application – level or circuit – level gateway.  Some common characteristics :  Executes a secure version of its OS, making it a hardened system.  Only the services that the network administrator considers essential are installed on the bastion host. PREPARED BY : PINA CHHATRALA 4
  • 5. Bastion Host  Some common characteristics :  It may require some additional authentication before user is allowed access to the proxy services.  Each proxy is configured to support only a subset of the standard application’s command set.  Each proxy is configured to allow access only to specific host systems.  Each proxy maintains detailed audit information by logging all traffic. PREPARED BY : PINA CHHATRALA 5
  • 6. Bastion Host  Some common characteristics :  Each proxy module is a very small software package specifically designed for network security.  Each proxy is independent of other proxies on the bastion host.  A proxy generally performs no disk access other than to read its initial configuration file.  Each proxy runs as a nonprivilaged user in a private and secured dictionary on the bastion host. PREPARED BY : PINA CHHATRALA 6
  • 7. Host – based Firewalls  A host – based firewall is a software module used to secure an individual host.  Such modules are available in many OSs or can be provided as an add-on packages.  It filters and restricts the flow of packages.  A common location for such firewalls is a server.  Advantage :  Filtering rules can be tailored to the host environment.  Protection is provided independent of technology. PREPARED BY : PINA CHHATRALA 7
  • 8. Personal Firewalls  Personal firewall controls traffic between a personal computer or work – stations on one side and the Internet or Enterprise network on the other side.  These functionality can be used in the home environment and on corporate internets.  It is the software module on the personal computer.  Firewall functionality can also be housed in a router that connects all of the home computers to a DSL, cable modem, or other internet interface. PREPARED BY : PINA CHHATRALA 8
  • 9. Personal Firewalls  They are typically much less complex than either server – based firewalls or stand – alone firewalls.  The primary role of the personal firewall is to deny the unauthorized remote access to the computer.  The firewall can also monitor the outgoing activity is an attempt to detect and block worms and other malware. PREPARED BY : PINA CHHATRALA 9
  • 10. PREPARED BY : PINA CHHATRALA 10

Editor's Notes

  1. TCP connections : one between itself and a TCP user on an inner host and one between itself and TCP user on an outside host.
  2. TCP connections : one between itself and a TCP user on an inner host and one between itself and TCP user on an outside host.
  3. TCP connections : one between itself and a TCP user on an inner host and one between itself and TCP user on an outside host.
  4. TCP connections : one between itself and a TCP user on an inner host and one between itself and TCP user on an outside host.
  5. TCP connections : one between itself and a TCP user on an inner host and one between itself and TCP user on an outside host.
  6. TCP connections : one between itself and a TCP user on an inner host and one between itself and TCP user on an outside host.