SlideShare a Scribd company logo
FIREWALL & PROXY SERVER
IN A
NETWORK
Presented By : Harsimran Kaur
Lakshya Arora
Payal Sharma
NavyaVats
Sanskriti Malvia
NikhilJain
Content
 Firewall
 Proxy Server
 Relationship between Proxy Server and
Firewall
 Types of Firewalls
 Hardware requirements
 Software requirements
 Conclusion
Firewall
• A computer firewall is a router or
other communications device which
filters access to a protected network.
• Firewall is also a program that
screens all incoming traffic and
protects the network from
unwelcome intruders.
• Firewalls can also be used as access
control measures to only allow
certain people within the
organization access to the Internet.
Many firewalls now contain features
to control, authenticate and secure
users who may want to access a
company internal data from the
Internet or even another company.
Hardware Firewall
&
Software Firewall
Hardware
Firewall
• It is a physical device.
• It can be installed between the
modem and computer.
• It can be incorporated into a
broadband router being used to
share the internet connection.
• Protect an entire network.
• Usually more expensive, header to
configure
• E.g.- Cisco pix, netscreen,
watchfuard etc.
Advantages
• Uses very little system resources.
• More secure
• Enhanced security control
• Dedicated hardware firewalls are
typically more reliable
• Easy to disable or remove
• Work independently of associated
computer system.
Disadvantages
• Install process is more demanding
both physically and mentally.
• Takes up physical work space
• More expensive
• Harder to upgrade and repair
Software
Firewall
• It is a software application.
• It is installed onto the computer
system that you wish to protect .
• Protect a single computer
• This is usually the computer with
modem attached to it.
• Usually less expensive, easier to
configure
• E.g.- Norton internet security,
MacAfee internet security etc.
Advantages
• Considerably cheaper or even free.
• Simple to install and upgrade
• Requires no physical changes to
hardware or network
• Ideal for home/family use
• Takes up no physical space
Disadvantages
• Software may crash or be
incompatible with system
• Can be difficult to completely
disable & especially remove
• Software bugs may compromise
security
• Can be resource hungry
• Incompatibilities with OS.
Proxy
Server
• Proxy Server is a computer program
that acts as an intermediary between
a web browser and a web server. To
give users rapid access to popular
web destinations.
• Internet Service Providers use proxy
servers as "holding bins" to store
frequently requested pages, rather
than going out and fetching them
repeatedly from the Net
Advantages
• Hide internal clients from external
network
• Blocking of dangerous URLs
• Filter dangerous content
• Check consistency of retrieved
content
• Eliminate need for transport layer
routing between networks
Disadvantages
• It Only Offers The Basic Privacy
Protection
• You Need To Access The Web Proxy
Site To Use The Proxy
• Not All Websites Can Be Fully
Accessed
• Limited Servers Are Available For
The Proxy
• It Usually Has Bad Performance
Purpose of
Using
Proxies
It improves performance:
o It act as a cache server
o It controls bandwidth
It helps in surfing anonymously:
o It helps in browsing WWW without any
identification
It helps in filtering request:
o It prevent access to some sites and
protocol.
o It helps in time division.
Relationship
Between
Proxy
Server
&
Firewall
• Proxy Server is associated with
firewall and also caching program
• The functions of proxy, firewall, and
caching can be in separate server
programs or combined in a single
package.
• Proxy Server can be installed in the
firewall to get a kind of proxy
firewall
Security
Benefits
• Hide internal clients from external
network
• Blocking of dangerous URLs
• Filter dangerous content
• Eliminate need for transport layer
routing between networks
• Single point of access, control and
logging
SOCKS
Proxy
SOCKS is networking proxy protocol
that enables hosts on one side of a
SOCKS server to gain full access to
hosts on the other side of the SOCKS
server without requiring direct IP
reachability. SOCKS redirects
connection requests from hosts on
opposite sides of a SOCKS server. The
SOCKS server authenticates and
authorizes the requests, establishes a
proxy connection, and relays data
Hardware
Requirements--
Packet Filtering
Firewalls
Filtering firewalls don't require fancy
hardware. They are little more then
simple routers
 a 486-DX66 with 32 MB of
memory
 a 250MB hard disk (500
recommended)
 network connections (LAN
Cards,
Serial Ports, Wireless?)
 monitor and keyboard
Proxy Server
Firewalls
If you need a proxy server firewall to
handle lots of traffic, you should get
the largest system you can afford
 a Pentium II with 64meg of
memory
 A two gig hard disk to store all
the
logs
 two network connections
 monitor and keyboard
Software
Requirements
• Packet Filtering Firewalls
• Proxy Server Firewalls
Types of
Firewalls
Packet Filtering Firewalls
Proxy Server Firewalls
Packet
Filtering
Firewalls
• To create a filtering firewall, you
don't need any special software.
Linux will do
• The built-in Linux firewall has
changed several times, for the newer
2.4 kernel there is a new firewall
utility with more features
Proxy Server
Firewalls
If you want to setup a proxy server
you will need one of these packages
 Squid
 The TIS (Trusted Information
System) Firewall Toolkit
(FWTK)
 SOCKS
Conclusion
• Both firewall and proxy server
are used for net work security
and facility
• Proxy server can be a part of
firewall
thank you…

More Related Content

What's hot

Operating system security
Operating system securityOperating system security
Operating system security
Ramesh Ogania
 
Firewalls
FirewallsFirewalls
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
Jainam Shah
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
Sourav Roy
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
TayabaZahid
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
Patten John
 
Firewall
FirewallFirewall
Types of attacks
Types of attacksTypes of attacks
Types of attacks
Vivek Gandhi
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
Nisarg Amin
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
Cleverence Kombe
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 
Firewall ppt
Firewall pptFirewall ppt
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
OECLIB Odisha Electronics Control Library
 
Proxy server
Proxy serverProxy server
Proxy server
Proxies Rent
 
Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
Akash R
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
primeteacher32
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
Karnav Rana
 
Intruders
IntrudersIntruders

What's hot (20)

Operating system security
Operating system securityOperating system security
Operating system security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Firewall
FirewallFirewall
Firewall
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Network security
Network securityNetwork security
Network security
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Proxy server
Proxy serverProxy server
Proxy server
 
Operating system security
Operating system securityOperating system security
Operating system security
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Intruders
IntrudersIntruders
Intruders
 

Similar to Firewall & Proxy Server

Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
Divya Jyoti
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
ssuser530a07
 
How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)
NCC Group
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
Muhammad ismail Shah
 
Firewall
FirewallFirewall
Firewall
Tapan Khilar
 
fire walls
fire wallsfire walls
fire walls
iqra_ilyas
 
Firewalls and proxies are both use for security
Firewalls and proxies are both use for securityFirewalls and proxies are both use for security
Firewalls and proxies are both use for security
Ayan974999
 
Seminar
SeminarSeminar
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
LakshayYadav46
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
EduclentMegasoftel
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
9921103075
 
Forefront UAG
Forefront UAGForefront UAG
Forefront UAG
James Tramel
 
Proxy servers
Proxy serversProxy servers
Proxy servers
Kumar
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection Systems
Sam Bowne
 
Network defenses
Network defensesNetwork defenses
Network defenses
G Prachi
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
suddenven
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
pg13tarun_g
 

Similar to Firewall & Proxy Server (20)

Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
Firewall
FirewallFirewall
Firewall
 
fire walls
fire wallsfire walls
fire walls
 
Firewalls and proxies are both use for security
Firewalls and proxies are both use for securityFirewalls and proxies are both use for security
Firewalls and proxies are both use for security
 
Seminar
SeminarSeminar
Seminar
 
201302057 lakshay it.pptx
201302057 lakshay it.pptx201302057 lakshay it.pptx
201302057 lakshay it.pptx
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
 
Forefront UAG
Forefront UAGForefront UAG
Forefront UAG
 
Proxy servers
Proxy serversProxy servers
Proxy servers
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection Systems
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
 

Recently uploaded

一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 

Recently uploaded (20)

一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 

Firewall & Proxy Server

  • 1. FIREWALL & PROXY SERVER IN A NETWORK Presented By : Harsimran Kaur Lakshya Arora Payal Sharma NavyaVats Sanskriti Malvia NikhilJain
  • 2. Content  Firewall  Proxy Server  Relationship between Proxy Server and Firewall  Types of Firewalls  Hardware requirements  Software requirements  Conclusion
  • 3. Firewall • A computer firewall is a router or other communications device which filters access to a protected network. • Firewall is also a program that screens all incoming traffic and protects the network from unwelcome intruders.
  • 4. • Firewalls can also be used as access control measures to only allow certain people within the organization access to the Internet. Many firewalls now contain features to control, authenticate and secure users who may want to access a company internal data from the Internet or even another company.
  • 6. Hardware Firewall • It is a physical device. • It can be installed between the modem and computer. • It can be incorporated into a broadband router being used to share the internet connection. • Protect an entire network. • Usually more expensive, header to configure • E.g.- Cisco pix, netscreen, watchfuard etc.
  • 7. Advantages • Uses very little system resources. • More secure • Enhanced security control • Dedicated hardware firewalls are typically more reliable • Easy to disable or remove • Work independently of associated computer system.
  • 8. Disadvantages • Install process is more demanding both physically and mentally. • Takes up physical work space • More expensive • Harder to upgrade and repair
  • 9. Software Firewall • It is a software application. • It is installed onto the computer system that you wish to protect . • Protect a single computer • This is usually the computer with modem attached to it. • Usually less expensive, easier to configure • E.g.- Norton internet security, MacAfee internet security etc.
  • 10. Advantages • Considerably cheaper or even free. • Simple to install and upgrade • Requires no physical changes to hardware or network • Ideal for home/family use • Takes up no physical space
  • 11. Disadvantages • Software may crash or be incompatible with system • Can be difficult to completely disable & especially remove • Software bugs may compromise security • Can be resource hungry • Incompatibilities with OS.
  • 12. Proxy Server • Proxy Server is a computer program that acts as an intermediary between a web browser and a web server. To give users rapid access to popular web destinations. • Internet Service Providers use proxy servers as "holding bins" to store frequently requested pages, rather than going out and fetching them repeatedly from the Net
  • 13. Advantages • Hide internal clients from external network • Blocking of dangerous URLs • Filter dangerous content • Check consistency of retrieved content • Eliminate need for transport layer routing between networks
  • 14. Disadvantages • It Only Offers The Basic Privacy Protection • You Need To Access The Web Proxy Site To Use The Proxy • Not All Websites Can Be Fully Accessed • Limited Servers Are Available For The Proxy • It Usually Has Bad Performance
  • 15. Purpose of Using Proxies It improves performance: o It act as a cache server o It controls bandwidth It helps in surfing anonymously: o It helps in browsing WWW without any identification It helps in filtering request: o It prevent access to some sites and protocol. o It helps in time division.
  • 16. Relationship Between Proxy Server & Firewall • Proxy Server is associated with firewall and also caching program • The functions of proxy, firewall, and caching can be in separate server programs or combined in a single package. • Proxy Server can be installed in the firewall to get a kind of proxy firewall
  • 17. Security Benefits • Hide internal clients from external network • Blocking of dangerous URLs • Filter dangerous content • Eliminate need for transport layer routing between networks • Single point of access, control and logging
  • 18. SOCKS Proxy SOCKS is networking proxy protocol that enables hosts on one side of a SOCKS server to gain full access to hosts on the other side of the SOCKS server without requiring direct IP reachability. SOCKS redirects connection requests from hosts on opposite sides of a SOCKS server. The SOCKS server authenticates and authorizes the requests, establishes a proxy connection, and relays data
  • 19. Hardware Requirements-- Packet Filtering Firewalls Filtering firewalls don't require fancy hardware. They are little more then simple routers  a 486-DX66 with 32 MB of memory  a 250MB hard disk (500 recommended)  network connections (LAN Cards, Serial Ports, Wireless?)  monitor and keyboard
  • 20. Proxy Server Firewalls If you need a proxy server firewall to handle lots of traffic, you should get the largest system you can afford  a Pentium II with 64meg of memory  A two gig hard disk to store all the logs  two network connections  monitor and keyboard
  • 21. Software Requirements • Packet Filtering Firewalls • Proxy Server Firewalls
  • 22. Types of Firewalls Packet Filtering Firewalls Proxy Server Firewalls
  • 23. Packet Filtering Firewalls • To create a filtering firewall, you don't need any special software. Linux will do • The built-in Linux firewall has changed several times, for the newer 2.4 kernel there is a new firewall utility with more features
  • 24. Proxy Server Firewalls If you want to setup a proxy server you will need one of these packages  Squid  The TIS (Trusted Information System) Firewall Toolkit (FWTK)  SOCKS
  • 25. Conclusion • Both firewall and proxy server are used for net work security and facility • Proxy server can be a part of firewall