SlideShare a Scribd company logo
1 of 19
Presentation :’Firewalls’ Presenters :-Gagandeep Singh KarandeepVohra Puneetpal Singh 1
Table of Contents 2 Introduction HOW FIREWALL WORKS Types of Firewalls  MAKING THE FIREWALL FIT TESTING A FIREWALL CONFIGURATION CONCLUSION REFERENCES
Introduction Is hardware, software, or a combination of both used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. 3
Hardware vs. Software Firewalls 4 Hardware Firewalls Protect an entire network Implemented on the router level Usually more expensive, harder to configure Software Firewalls Protect a single computer Usually less expensive, easier to configure
How does a software firewall work? 5 Inspects each individual “packet” of data as it arrives at either side of the firewall Determines whether it should be allowed to pass through or if it should be blocked
Firewall Rules 6 Allow – traffic that flows automatically because it has been deemed Block – traffic that is blocked because it has been deemed dangerous to your computer Ask – asks the user whether or not the traffic is allowed to pass through
What Can a Firewall Do? Focus for security decisions Stop hackers from accessing your computer Can enforce security policy Protects your personal information Limits your exposure Blocks “pop up” ads and certain cookies Can log Internet activity efficiently Determines which programs can access the Internet 7
What Can't a Firewall Do? Can't protect you against malicious insiders Can't protect you against connections that don't go through it Can't protect against completely new threats Can't protect against viruses 8
Types of Firewalls  Packet Filtering Firewall Application level Gateway Circuit level gateway 9
Architectures for Firewall  Single-Box Architecture 10
Screened Host Architecture 11
Making The Firewall Fit IP address Domain names Protocols Ports 12
What It Protects You From Remote login  SMTP session hijacking  Operating system bugs  Spam E-mail bombs  Source routing  13
Security Strategies implemented  Default Deny Prohibit all communication that is not expressly permitted Default Permit Permit all communication that is not explicitly prohibited Least Privilege reduces the authorization level at which various actions are performed Defense in Depth security approach whereby each system on the network is secured to the greatest possible degree Choke Point forces  attackers to use a narrow channel to bypass the network 14
Testing a Firewall Configuration 15 ,[object Object],   implementation ,[object Object]
 Suppose our local network is 172.16.1.0
 And we allow only TCP connections ,[object Object]
REFRENCES 17 www.howstuffworks.com   www.securityfocus.com  www.firewall.com
18 Conclusion

More Related Content

What's hot

What's hot (20)

Network protocol
Network protocolNetwork protocol
Network protocol
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Cryptography
CryptographyCryptography
Cryptography
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Data link layer
Data link layer Data link layer
Data link layer
 
Network switch
Network switchNetwork switch
Network switch
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Networking devices
Networking devicesNetworking devices
Networking devices
 

Viewers also liked

NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
Smart irrigation system using Internet Of Things
Smart irrigation system using Internet Of ThingsSmart irrigation system using Internet Of Things
Smart irrigation system using Internet Of ThingsBasavaraj Galagi
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Intruders
IntrudersIntruders
Intruderstechn
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 

Viewers also liked (16)

Firewall
Firewall Firewall
Firewall
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Smart irrigation system using Internet Of Things
Smart irrigation system using Internet Of ThingsSmart irrigation system using Internet Of Things
Smart irrigation system using Internet Of Things
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
Intruders
IntrudersIntruders
Intruders
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Cyber law
Cyber lawCyber law
Cyber law
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Firewall
FirewallFirewall
Firewall
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 

Similar to Firewall presentation

Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02devidas shinde
 
Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02shivendra pratap singh
 
firewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxfirewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxApdiazizHussein
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Prabhdeep Kaur
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...Pranav Gontalwar
 
Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaHanaysha
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].pptBachaSirata
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configurationSoban Ahmad
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System AdminMD SAHABUDDIN
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Sabreen Irfana
 

Similar to Firewall presentation (20)

Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02
 
Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02
 
Linta
LintaLinta
Linta
 
Linta
LintaLinta
Linta
 
firewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxfirewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptx
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
 
Firewall
FirewallFirewall
Firewall
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq Hanaysha
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Net Defender
Net DefenderNet Defender
Net Defender
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Network security
Network securityNetwork security
Network security
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 

More from Amandeep Kaur

Video/ Graphics cards
Video/ Graphics  cardsVideo/ Graphics  cards
Video/ Graphics cardsAmandeep Kaur
 
Menu pop up menu mdi form and playing audio in vb
Menu pop up menu mdi form and playing audio in vbMenu pop up menu mdi form and playing audio in vb
Menu pop up menu mdi form and playing audio in vbAmandeep Kaur
 
Image contro, and format functions in vb
Image contro, and format functions in vbImage contro, and format functions in vb
Image contro, and format functions in vbAmandeep Kaur
 
Data base connectivity and flex grid in vb
Data base connectivity and flex grid in vbData base connectivity and flex grid in vb
Data base connectivity and flex grid in vbAmandeep Kaur
 
Toolbar, statusbar, coolbar in vb
Toolbar, statusbar, coolbar in vbToolbar, statusbar, coolbar in vb
Toolbar, statusbar, coolbar in vbAmandeep Kaur
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphicsAmandeep Kaur
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphicsAmandeep Kaur
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphicsAmandeep Kaur
 
Report on browser war
Report on browser warReport on browser war
Report on browser warAmandeep Kaur
 
Report of internet connections
Report of internet connectionsReport of internet connections
Report of internet connectionsAmandeep Kaur
 

More from Amandeep Kaur (20)

Video/ Graphics cards
Video/ Graphics  cardsVideo/ Graphics  cards
Video/ Graphics cards
 
Menu vb
Menu vbMenu vb
Menu vb
 
Menu pop up menu mdi form and playing audio in vb
Menu pop up menu mdi form and playing audio in vbMenu pop up menu mdi form and playing audio in vb
Menu pop up menu mdi form and playing audio in vb
 
Active x control
Active x controlActive x control
Active x control
 
Image contro, and format functions in vb
Image contro, and format functions in vbImage contro, and format functions in vb
Image contro, and format functions in vb
 
Data base connectivity and flex grid in vb
Data base connectivity and flex grid in vbData base connectivity and flex grid in vb
Data base connectivity and flex grid in vb
 
Toolbar, statusbar, coolbar in vb
Toolbar, statusbar, coolbar in vbToolbar, statusbar, coolbar in vb
Toolbar, statusbar, coolbar in vb
 
Richtextbox
RichtextboxRichtextbox
Richtextbox
 
Treeview listview
Treeview listviewTreeview listview
Treeview listview
 
Progress bar
Progress barProgress bar
Progress bar
 
Filehandling
FilehandlingFilehandling
Filehandling
 
Socket
SocketSocket
Socket
 
Ppt of socket
Ppt of socketPpt of socket
Ppt of socket
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
 
Internet
InternetInternet
Internet
 
Internet working
Internet workingInternet working
Internet working
 
Report on browser war
Report on browser warReport on browser war
Report on browser war
 
Report of internet connections
Report of internet connectionsReport of internet connections
Report of internet connections
 

Firewall presentation

  • 1. Presentation :’Firewalls’ Presenters :-Gagandeep Singh KarandeepVohra Puneetpal Singh 1
  • 2. Table of Contents 2 Introduction HOW FIREWALL WORKS Types of Firewalls MAKING THE FIREWALL FIT TESTING A FIREWALL CONFIGURATION CONCLUSION REFERENCES
  • 3. Introduction Is hardware, software, or a combination of both used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. 3
  • 4. Hardware vs. Software Firewalls 4 Hardware Firewalls Protect an entire network Implemented on the router level Usually more expensive, harder to configure Software Firewalls Protect a single computer Usually less expensive, easier to configure
  • 5. How does a software firewall work? 5 Inspects each individual “packet” of data as it arrives at either side of the firewall Determines whether it should be allowed to pass through or if it should be blocked
  • 6. Firewall Rules 6 Allow – traffic that flows automatically because it has been deemed Block – traffic that is blocked because it has been deemed dangerous to your computer Ask – asks the user whether or not the traffic is allowed to pass through
  • 7. What Can a Firewall Do? Focus for security decisions Stop hackers from accessing your computer Can enforce security policy Protects your personal information Limits your exposure Blocks “pop up” ads and certain cookies Can log Internet activity efficiently Determines which programs can access the Internet 7
  • 8. What Can't a Firewall Do? Can't protect you against malicious insiders Can't protect you against connections that don't go through it Can't protect against completely new threats Can't protect against viruses 8
  • 9. Types of Firewalls Packet Filtering Firewall Application level Gateway Circuit level gateway 9
  • 10. Architectures for Firewall Single-Box Architecture 10
  • 12. Making The Firewall Fit IP address Domain names Protocols Ports 12
  • 13. What It Protects You From Remote login SMTP session hijacking Operating system bugs Spam E-mail bombs Source routing 13
  • 14. Security Strategies implemented Default Deny Prohibit all communication that is not expressly permitted Default Permit Permit all communication that is not explicitly prohibited Least Privilege reduces the authorization level at which various actions are performed Defense in Depth security approach whereby each system on the network is secured to the greatest possible degree Choke Point forces attackers to use a narrow channel to bypass the network 14
  • 15.
  • 16. Suppose our local network is 172.16.1.0
  • 17.
  • 18. REFRENCES 17 www.howstuffworks.com   www.securityfocus.com  www.firewall.com
  • 20. Testing a Firewall Configuration THANKU 19