2. Submitted to: Dr. Rehan Ali Syed
Presented By: Muhammad Saood Choudhary(20 CSE-27)
Abdul Mubeen(20 CSE-22)
Subject: Network Security & Cryptography
3. What is Firewall?
A Firewall is a network security device that monitors and filters incoming and
outgoing network traffic based on an organization's previously established
security policies.
A firewall is essentially the barrier that sits between a private internal network
and the public Internet.
4. Purpose of Firewall
• Blocks Unauthorized Access: Protects private information from unapproved
users.
• Monitors & Manages Traffic: Watches over network activity to spot and
stop odd behavior, enhancing performance and stability.
• Prevents Malware: Blocks harmful software like viruses.
• Application Control: Decides which apps can access the network based on
set rules.
• Stops Intrusions & Protects Privacy: Prevents attacks and keeps personal
data safe from being stolen or exposed.
5. Inbound Traffic:
• This refers to external data entering your network.
• Firewall rules for inbound traffic typically restrict access to protect against
unauthorized entry and attacks from outside sources.
Outbound Traffic:
• This is the data exiting your network to the internet or another network.
• Outbound rules can prevent sensitive information from leaving your
network and block users from accessing potentially dangerous external sites
or services.
6. How Firewall works?
Packet Filtering:
Inspect: Checks data for basic details like where it's from and where it's going.
Rules: Uses simple rules to see if the data should be let through or not.
Decision: Either lets the data pass or blocks it based on these rules.
Stateful Inspection:
Track: Keeps an eye on ongoing data exchanges to get the full picture.
Context: Looks at the data within its conversation, not just in isolation.
Smart Choices: Decides on allowing or blocking data based on its conversation history.
7. How Firewall works?
Proxy Services:
Middleman: Stands between you and the internet, checking everything.
Check-up: Reviews all requests and responses thoroughly.
Content Rules: Decides what's okay to view or exchange based on detailed content checks.
Intrusion Prevention System (IPS):
Anomaly Spotter: Looks for odd patterns that could mean trouble.
Attack Blocker: Stops threats in their tracks, automatically.
Rule Updater: Constantly learns new threat patterns to protect the network better.
8. Types of Firewall
Type Function Advantage Disadvantage
Packet Filtering
Firewalls
Filters traffic based on IP,
ports, protocols
Simple, cost-effective Limited threat detection
Proxy Firewalls
Intermediates, inspecting
content
High content-based
security
Slows traffic
Circuit-Level Gateways
Verifies sessions without
content inspection
Efficient Lower security level
Web Application
Firewalls
Filters HTTP traffic for
web apps
Protects against web
attacks
Limited to web
applications
Cloud Firewalls
Cloud-based network
security
Scalable, easy
management
Depends on cloud,
privacy issues
9. Deployment
1.Network Perimeter Deployment
Location: Edge of the network, between internal and external networks.
Purpose: Protects against external threats and controls data flow.
2.Internal Segmentation
Location: Inside the network, dividing it into zones.
Purpose: Limits threat spread by controlling traffic between zones, like
separating corporate and production areas.
10. Deployment
3.Data Center Deployment
Location: At or within data centers.
Purpose: Secures critical infrastructure and information by controlling access.
4.Endpoint Protection
Location: On devices like laptops and mobiles.
Purpose: Protects devices from threats, especially off-network, by managing
device-level traffic.
11. Forms of Firewall
Hardware Firewall:
What it is: A separate device connected between your network and the internet.
Use Cases: Best for protecting all devices on a network, commonly used by businesses.
Advantages: Offers strong security without slowing down your devices; often has extra features like
VPN and intrusion prevention.
Software Firewall:
What it is: A program installed on individual computers or servers.
Use Cases: Good for custom protection on single devices.
Advantages: Provides control over what internet traffic can enter or leave each app on a device, great
for defending against internal risks.