SlideShare a Scribd company logo
PRESENTATION
ON
FIREWALL
Submitted by:
Gaurav Rajput
15-CAB-17
Contents :
 Introduction.
 What is an attack
 Hardware Firewalls
 Software Firewalls
 Firewall rules
 Types of Firewall techniques
 What a personal firewall can do
 What a personal firewall cannot do
 Conclusion
Introduction
A firewall is a device (or software feature) designed to
control the flow of traffic into and out-of a network.
 It is used to prevent unauthorized programs or Internet
users from accessing a private network
It monitors and controls the incoming and outgoing
network traffic based on predetermined security
rules.
In general, firewalls are installed to prevent
attacks.
What is an Attack?
Attack covers many things:
1. Someone probing a network for computers.
2. Someone attempting to crash services on a
computer.
3. Someone attempting to crash a computer.
4. Someone attempting to gain access to a computer
to use resources or information.
Hardware Vs Software Firewalls
Hardware firewalls
o Implemented on router level.
o Protect an entire network.
o Usually more expensive, harder to implement.
Software firewalls
o Protects a single computer.
o Usually less expensive, easier to implement.
Hardware Firewalls
Hardware firewalls are used more in companies and large
corporations.
 These devices are usually placed between the router and
the Internet connection.
A hardware firewall uses packet filtering to examine the
header of a packet to determine its source and destination.
 This information is compared to a set of predefined or
user-created rules that determine whether the packet is to
be forwarded or dropped.
Software Firewalls
For individual home users, the most popular firewall choice
is a software firewall. Software firewalls are installed on
your computer (like any software).
We can customize it; allowing us some control over its
function and protection features.
It protect our computer from outside attempts to control or
gain access our computer.
It also provide protection against the most common Trojan
programs or e-mail worms.
Inspects each individual “packet” of data as it arrives
either side of firewall.
Determines if it should me pass through or blocked.
Types of firewall technique
1. Packet filtering firewall
2. Application proxy firewall
3. Stateful inspection firewall
4. Circuit – level gateway firewall
Packet filtering firewall
A packet filtering firewall applies a set of rules to each
incoming and outgoing IP packet and then forwards or
discards the packet.
Filtering rules are based on information contained in
network packet.
 Sources IP address
 Destination IP address
 Sources and destination transport level address
 IP protocol field
 Interface
Packet filtering firewall
Two default policies are there to take default action to
determine whether to forward or discard the packet.
 Some possible attacks on firewall :
 Default = discard
 Default = forward
 IP address spoofing
 Source routing attacks
 Tiny fragment attacks
Packet filtering firewall
Advantage :
Disadvantage :
 Cost
 Low resource usage
 Best suited for smaller network
 Can work only on the network layer
 Do not support complex rule based support
 Vulnerable to spoofing
Application Proxy Firewall
An application – level gateway, also called an application
proxy , acts as a rely of application – level traffic.
It don’t allow any packets to directly pass between an
application and the user.
User requests service from proxy.
Proxy validates requests as legal.
Then actions requests and returns result to user.
Can log / audit traffic at application level.
Application Proxy Firewall
Advantages :
Disadvantages :
 More secure than packet filter firewalls.
 Easy to log and audit incoming traffic.
 Additional processing overhead on each connections.
Stateful Inspection firewall
A stateful inspection packet firewall tightens up the rules
for TCP traffic by creating a directory of outbound TCP
connections.
There is an entry for each currently established
connections.
The packet filter now allow incoming traffic to high –
numbered ports only for those packets that fit the profile
of one of the entries in this directory.
A stateful packet inspection firewall reviews the same
packet information as a packet filtering firewall , but also
records information about TCP connections.
Stateful Inspection firewall
It records session information such as IP addresses and
port numbers, which implement a much tighter security
posture than a static packet filter firewall.
It examines both incoming and outgoing packets
Circuit – level gateway Firewall
 This can be a stand – alone system or it can be a specialized
functions performed by an application – level gateway for certain
applications.
 It does not permit an end – to – end TCP connection; rather , the
gateways sets two TCP connections.
 A typical use of the circuit – level gateways is a situation in which
the system administrator trusts the internal users.
 The gateways can be configured to support application – level or
proxy service on inbound connections and circuit- level functions
for outbound connections.
Circuit – level gateway Firewall
Advantage :
Disadvantage:
 Comparatively inexpensive and provide Anonymity to the
private network.
 Do not filter individual Packets.
What a personal Firewall can do
Stop hackers from accessing your computer.
Protect your personal information.
Blocks “pop up” ads and certain cookies.
Determine which program can access the internet.
Blocks invalid packets.
What a personal Firewall can not do
Cannot prevent e-mail viruses.
only an antivirus product with update
definitions can prevent e-mail viruses.
 After seeing it initially, you cannot forget about it.
The firewall will require periodic updates
to the set rules and the software itself.
Conclusion
It is clear that some form of security for private networks
connected to the internet is essential.
A firewall is an important and necessary part of that
security , but cannot be expected to perform all the
required security functions
THANK YOU
Firewall presentation

More Related Content

What's hot

Network security
Network security Network security
Network security
Madhumithah Ilango
 
Firewall
FirewallFirewall
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
poorvavyas4
 
FireWall
FireWallFireWall
FireWallrubal_9
 
Firewall
FirewallFirewall
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
Rohit Phulsunge
 
Firewalls
FirewallsFirewalls
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
Jainam Shah
 
Firewall
FirewallFirewall
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
iberrywifisecurity
 
Firewalls
FirewallsFirewalls
Firewalls
Kalluri Madhuri
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
MOHIT AGARWAL
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
ShafeeqaFarsana
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 

What's hot (20)

Network security
Network security Network security
Network security
 
Firewall
FirewallFirewall
Firewall
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
FireWall
FireWallFireWall
FireWall
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network security
Network securityNetwork security
Network security
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Firewall
FirewallFirewall
Firewall
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Network Security
Network SecurityNetwork Security
Network Security
 

Similar to Firewall presentation

Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
Karnav Rana
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
PANKAJKUMAR2519
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
Puneet Bawa
 
Firewall ppt
Firewall pptFirewall ppt
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
ImXaib
 
Firewall
FirewallFirewall
Firewall
Naga Dinesh
 
Firewall
FirewallFirewall
Firewall
ArchanaMani2
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Firewall
FirewallFirewall
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
SakshiSolapure1
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
lamtran367679
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
Revanth71
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
VC Infotech
 
Firewall
Firewall Firewall
Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptx
skknowledge
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
Amare Kassa
 
What are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdfWhat are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdf
IT AMC Support Dubai - Techno Edge Systems LLC
 

Similar to Firewall presentation (20)

Firewall
FirewallFirewall
Firewall
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Firewall
FirewallFirewall
Firewall
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
Net Defender
Net DefenderNet Defender
Net Defender
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall
Firewall Firewall
Firewall
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptx
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
What are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdfWhat are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdf
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 

Firewall presentation

  • 2. Contents :  Introduction.  What is an attack  Hardware Firewalls  Software Firewalls  Firewall rules  Types of Firewall techniques  What a personal firewall can do  What a personal firewall cannot do  Conclusion
  • 3. Introduction A firewall is a device (or software feature) designed to control the flow of traffic into and out-of a network.  It is used to prevent unauthorized programs or Internet users from accessing a private network
  • 4. It monitors and controls the incoming and outgoing network traffic based on predetermined security rules. In general, firewalls are installed to prevent attacks.
  • 5. What is an Attack? Attack covers many things: 1. Someone probing a network for computers. 2. Someone attempting to crash services on a computer. 3. Someone attempting to crash a computer. 4. Someone attempting to gain access to a computer to use resources or information.
  • 6. Hardware Vs Software Firewalls Hardware firewalls o Implemented on router level. o Protect an entire network. o Usually more expensive, harder to implement. Software firewalls o Protects a single computer. o Usually less expensive, easier to implement.
  • 7. Hardware Firewalls Hardware firewalls are used more in companies and large corporations.  These devices are usually placed between the router and the Internet connection. A hardware firewall uses packet filtering to examine the header of a packet to determine its source and destination.  This information is compared to a set of predefined or user-created rules that determine whether the packet is to be forwarded or dropped.
  • 8. Software Firewalls For individual home users, the most popular firewall choice is a software firewall. Software firewalls are installed on your computer (like any software). We can customize it; allowing us some control over its function and protection features. It protect our computer from outside attempts to control or gain access our computer. It also provide protection against the most common Trojan programs or e-mail worms.
  • 9. Inspects each individual “packet” of data as it arrives either side of firewall. Determines if it should me pass through or blocked.
  • 10. Types of firewall technique 1. Packet filtering firewall 2. Application proxy firewall 3. Stateful inspection firewall 4. Circuit – level gateway firewall
  • 11. Packet filtering firewall A packet filtering firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet. Filtering rules are based on information contained in network packet.  Sources IP address  Destination IP address  Sources and destination transport level address  IP protocol field  Interface
  • 12. Packet filtering firewall Two default policies are there to take default action to determine whether to forward or discard the packet.  Some possible attacks on firewall :  Default = discard  Default = forward  IP address spoofing  Source routing attacks  Tiny fragment attacks
  • 13. Packet filtering firewall Advantage : Disadvantage :  Cost  Low resource usage  Best suited for smaller network  Can work only on the network layer  Do not support complex rule based support  Vulnerable to spoofing
  • 14. Application Proxy Firewall An application – level gateway, also called an application proxy , acts as a rely of application – level traffic. It don’t allow any packets to directly pass between an application and the user. User requests service from proxy. Proxy validates requests as legal. Then actions requests and returns result to user. Can log / audit traffic at application level.
  • 15. Application Proxy Firewall Advantages : Disadvantages :  More secure than packet filter firewalls.  Easy to log and audit incoming traffic.  Additional processing overhead on each connections.
  • 16. Stateful Inspection firewall A stateful inspection packet firewall tightens up the rules for TCP traffic by creating a directory of outbound TCP connections. There is an entry for each currently established connections. The packet filter now allow incoming traffic to high – numbered ports only for those packets that fit the profile of one of the entries in this directory. A stateful packet inspection firewall reviews the same packet information as a packet filtering firewall , but also records information about TCP connections.
  • 17. Stateful Inspection firewall It records session information such as IP addresses and port numbers, which implement a much tighter security posture than a static packet filter firewall. It examines both incoming and outgoing packets
  • 18. Circuit – level gateway Firewall  This can be a stand – alone system or it can be a specialized functions performed by an application – level gateway for certain applications.  It does not permit an end – to – end TCP connection; rather , the gateways sets two TCP connections.  A typical use of the circuit – level gateways is a situation in which the system administrator trusts the internal users.  The gateways can be configured to support application – level or proxy service on inbound connections and circuit- level functions for outbound connections.
  • 19. Circuit – level gateway Firewall Advantage : Disadvantage:  Comparatively inexpensive and provide Anonymity to the private network.  Do not filter individual Packets.
  • 20. What a personal Firewall can do Stop hackers from accessing your computer. Protect your personal information. Blocks “pop up” ads and certain cookies. Determine which program can access the internet. Blocks invalid packets.
  • 21. What a personal Firewall can not do Cannot prevent e-mail viruses. only an antivirus product with update definitions can prevent e-mail viruses.  After seeing it initially, you cannot forget about it. The firewall will require periodic updates to the set rules and the software itself.
  • 22. Conclusion It is clear that some form of security for private networks connected to the internet is essential. A firewall is an important and necessary part of that security , but cannot be expected to perform all the required security functions