SlideShare a Scribd company logo
PRESENTERS :-
GAGANDEEP SINGH
KARANDEEP VOHRA
PUNEETPAL SINGH
Presentation :’Firewalls’
1
Table of Contents
2
 INTRODUCTION
 HOW FIREWALL WORKS
 TYPES OF FIREWALLS
 MAKING THE FIREWALL FIT
 TESTING A FIREWALL CONFIGURATION
 CONCLUSION
 REFERENCES
Introduction
 Is hardware, software, or a combination of both
 used to prevent unauthorized programs or Internet
users from accessing a private network and/or a
single computer.
3
Hardware vs. Software Firewalls
4
 Hardware Firewalls
 Protect an entire network
 Implemented on the router level
 Usually more expensive, harder to configure
 Software Firewalls
 Protect a single computer
 Usually less expensive, easier to configure
How does a software firewall work?
5
 Inspects each individual “packet” of data as it arrives
at either side of the firewall
 Determines whether it should be allowed to pass
through or if it should be blocked
Firewall Rules
6
 Allow – traffic that flows automatically because it
has been deemed
 Block – traffic that is blocked because it has been
deemed dangerous to your computer
 Ask – asks the user whether or not the traffic is
allowed to pass through
What Can a Firewall Do?
 Focus for security decisions
 Stop hackers from accessing your computer
 Can enforce security policy
 Protects your personal information
 Limits your exposure
 Blocks “pop up” ads and certain cookies
 Can log Internet activity efficiently
 Determines which programs can access the Internet
7
What Can't a Firewall Do?
 Can't protect you against malicious insiders
 Can't protect you against connections that don't go
through it
 Can't protect against completely new threats
 Can't protect against viruses
8
Types of Firewalls
 Packet Filtering Firewall
 Application level Gateway
 Circuit level gateway
9
Architectures for Firewall
 Single-Box Architecture
10
Screened Host Architecture
11
Making The Firewall Fit
 IP address
 Domain names
 Protocols
 Ports
12
What It Protects You From
 Remote login
 SMTP session hijacking
 Operating system bugs
 Spam
 E-mail bombs
 Source routing
13
Security Strategies implemented
 Default Deny
 Prohibit all communication that is not expressly permitted
 Default Permit
 Permit all communication that is not explicitly prohibited
 Least Privilege
 reduces the authorization level at which various actions are
performed
 Defense in Depth
 security approach whereby each system on the network is secured
to the greatest possible degree
 Choke Point
 forces attackers to use a narrow channel to bypass the network
14
Testing a Firewall Configuration
15
• A faster and easier method is available with the
Linux firewall
 implementation
• Allows you to manually generate tests
• Suppose our local network is 172.16.1.0
• And we allow only TCP connections
Example
16

# ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0
accepted
 # ipchains -C forward -p tcp -s 172.16.2.0 1025 -d 44.136.8.2 80 -i eth0
denied
 # ipchains -C forward -p udp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0
denied
 # ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 23 -i eth0
denied
source Destination
Wrong
Wrong
Wrong
REFRENCES
17
 www.howstuffworks.com
 www.securityfocus.com
 www.firewall.com
18
Conclusion
TESTING A FIREWALL CONFIGURATION
THANKU
19

More Related Content

What's hot

Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
Soban Ahmad
 
FireWall
FireWallFireWall
FireWall
rubal_9
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
Patten John
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
Mhmud Khraibene
 
firewall
firewallfirewall
firewall
Chirag Patel
 
Firewalls
FirewallsFirewalls
Firewalls
Kalluri Madhuri
 
Firewall
FirewallFirewall
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
Thang Man
 
Snort Intrusion Detection / Prevention System on PFSense Firewall
Snort Intrusion Detection / Prevention System  on PFSense FirewallSnort Intrusion Detection / Prevention System  on PFSense Firewall
Snort Intrusion Detection / Prevention System on PFSense Firewall
Huda Seyam
 
Firewall
FirewallFirewall
Firewall
thinkahead.net
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
Anton Chuvakin
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
MOHIT AGARWAL
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
emin_oz
 
Firewall intro
Firewall introFirewall intro
Firewall intro
amar_panchal
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
poorvavyas4
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
TayabaZahid
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
Sapna Kumari
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
VC Infotech
 

What's hot (19)

Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
FireWall
FireWallFireWall
FireWall
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
 
firewall
firewallfirewall
firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
 
Snort Intrusion Detection / Prevention System on PFSense Firewall
Snort Intrusion Detection / Prevention System  on PFSense FirewallSnort Intrusion Detection / Prevention System  on PFSense Firewall
Snort Intrusion Detection / Prevention System on PFSense Firewall
 
Firewall
FirewallFirewall
Firewall
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Firewall intro
Firewall introFirewall intro
Firewall intro
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 

Viewers also liked

KVR CV- 28 Oct 15
KVR CV- 28 Oct 15KVR CV- 28 Oct 15
KVR CV- 28 Oct 15
Karin Van Rayne
 
«Оставайтесь на линии...» или чем заняты менеджеры
«Оставайтесь на линии...» или чем заняты менеджеры«Оставайтесь на линии...» или чем заняты менеджеры
«Оставайтесь на линии...» или чем заняты менеджеры
Телфин
 
Tejas Nandedkar Resume (1)
Tejas Nandedkar Resume (1)Tejas Nandedkar Resume (1)
Tejas Nandedkar Resume (1)
Tejas Nandedkar
 
Instrumentación quirúrgica maga profe
Instrumentación quirúrgica maga profeInstrumentación quirúrgica maga profe
Instrumentación quirúrgica maga profe
Magaly Ríos
 
JPCV
JPCVJPCV
запровадження програм розвитку життєвих навичок в школі
запровадження програм розвитку життєвих навичок в школі запровадження програм розвитку життєвих навичок в школі
запровадження програм розвитку життєвих навичок в школі
Metodservice
 
Olimpo alvarez beltran 2
Olimpo alvarez beltran 2Olimpo alvarez beltran 2
Olimpo alvarez beltran 2
tu meeme pudrete
 
Ch. 10 with jose ovu nov. 2015 sped 401
Ch. 10 with jose ovu nov. 2015 sped 401 Ch. 10 with jose ovu nov. 2015 sped 401
Ch. 10 with jose ovu nov. 2015 sped 401
isaacboles7
 
Caso Real
Caso RealCaso Real
Tejas nandedkar resume (1)
Tejas nandedkar resume (1)Tejas nandedkar resume (1)
Tejas nandedkar resume (1)
Tejas Nandedkar
 
Mitología griega
Mitología griega Mitología griega
Mitología griega
MIRIEL LÓPEZ
 
idoling_approval_desire
idoling_approval_desireidoling_approval_desire
idoling_approval_desire
Shu (shoe116)
 
46584071 exercise-chapter-1-form-4 (1)
46584071 exercise-chapter-1-form-4 (1)46584071 exercise-chapter-1-form-4 (1)
46584071 exercise-chapter-1-form-4 (1)
Monie Joey
 

Viewers also liked (13)

KVR CV- 28 Oct 15
KVR CV- 28 Oct 15KVR CV- 28 Oct 15
KVR CV- 28 Oct 15
 
«Оставайтесь на линии...» или чем заняты менеджеры
«Оставайтесь на линии...» или чем заняты менеджеры«Оставайтесь на линии...» или чем заняты менеджеры
«Оставайтесь на линии...» или чем заняты менеджеры
 
Tejas Nandedkar Resume (1)
Tejas Nandedkar Resume (1)Tejas Nandedkar Resume (1)
Tejas Nandedkar Resume (1)
 
Instrumentación quirúrgica maga profe
Instrumentación quirúrgica maga profeInstrumentación quirúrgica maga profe
Instrumentación quirúrgica maga profe
 
JPCV
JPCVJPCV
JPCV
 
запровадження програм розвитку життєвих навичок в школі
запровадження програм розвитку життєвих навичок в школі запровадження програм розвитку життєвих навичок в школі
запровадження програм розвитку життєвих навичок в школі
 
Olimpo alvarez beltran 2
Olimpo alvarez beltran 2Olimpo alvarez beltran 2
Olimpo alvarez beltran 2
 
Ch. 10 with jose ovu nov. 2015 sped 401
Ch. 10 with jose ovu nov. 2015 sped 401 Ch. 10 with jose ovu nov. 2015 sped 401
Ch. 10 with jose ovu nov. 2015 sped 401
 
Caso Real
Caso RealCaso Real
Caso Real
 
Tejas nandedkar resume (1)
Tejas nandedkar resume (1)Tejas nandedkar resume (1)
Tejas nandedkar resume (1)
 
Mitología griega
Mitología griega Mitología griega
Mitología griega
 
idoling_approval_desire
idoling_approval_desireidoling_approval_desire
idoling_approval_desire
 
46584071 exercise-chapter-1-form-4 (1)
46584071 exercise-chapter-1-form-4 (1)46584071 exercise-chapter-1-form-4 (1)
46584071 exercise-chapter-1-form-4 (1)
 

Similar to Firewallpresentation 100826052003-phpapp02

Linta
LintaLinta
Linta
galaxy201
 
firewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxfirewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptx
ApdiazizHussein
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
Prabhdeep Kaur
 
Firewall
FirewallFirewall
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
Pranav Gontalwar
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
Karnav Rana
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
sweta dargad
 
Firewalls-Intro
Firewalls-IntroFirewalls-Intro
Firewalls-Intro
Aparna Bulusu
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
lamtran367679
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
Information Technology
 
Net Defender
Net DefenderNet Defender
Net Defender
krishna maddikara
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
BachaSirata
 
Firewalls (1056778990099000000000000).ppt
Firewalls (1056778990099000000000000).pptFirewalls (1056778990099000000000000).ppt
Firewalls (1056778990099000000000000).ppt
TamilArasan564275
 
Netdefender
NetdefenderNetdefender
Netdefender
krishna Maddikara
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
gaurav96raj
 
Firewalls
FirewallsFirewalls
Firewall
FirewallFirewall
Firewall
Ydel Capales
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
VC Infotech
 
Firewall
Firewall Firewall

Similar to Firewallpresentation 100826052003-phpapp02 (20)

Linta
LintaLinta
Linta
 
firewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxfirewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptx
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
 
Firewall
FirewallFirewall
Firewall
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Firewalls-Intro
Firewalls-IntroFirewalls-Intro
Firewalls-Intro
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Net Defender
Net DefenderNet Defender
Net Defender
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Firewalls (1056778990099000000000000).ppt
Firewalls (1056778990099000000000000).pptFirewalls (1056778990099000000000000).ppt
Firewalls (1056778990099000000000000).ppt
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall
Firewall Firewall
Firewall
 

Recently uploaded

欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
andagarcia212
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
Kalna College
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
lakshayrojroj
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 

Recently uploaded (20)

欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 

Firewallpresentation 100826052003-phpapp02

  • 1. PRESENTERS :- GAGANDEEP SINGH KARANDEEP VOHRA PUNEETPAL SINGH Presentation :’Firewalls’ 1
  • 2. Table of Contents 2  INTRODUCTION  HOW FIREWALL WORKS  TYPES OF FIREWALLS  MAKING THE FIREWALL FIT  TESTING A FIREWALL CONFIGURATION  CONCLUSION  REFERENCES
  • 3. Introduction  Is hardware, software, or a combination of both  used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. 3
  • 4. Hardware vs. Software Firewalls 4  Hardware Firewalls  Protect an entire network  Implemented on the router level  Usually more expensive, harder to configure  Software Firewalls  Protect a single computer  Usually less expensive, easier to configure
  • 5. How does a software firewall work? 5  Inspects each individual “packet” of data as it arrives at either side of the firewall  Determines whether it should be allowed to pass through or if it should be blocked
  • 6. Firewall Rules 6  Allow – traffic that flows automatically because it has been deemed  Block – traffic that is blocked because it has been deemed dangerous to your computer  Ask – asks the user whether or not the traffic is allowed to pass through
  • 7. What Can a Firewall Do?  Focus for security decisions  Stop hackers from accessing your computer  Can enforce security policy  Protects your personal information  Limits your exposure  Blocks “pop up” ads and certain cookies  Can log Internet activity efficiently  Determines which programs can access the Internet 7
  • 8. What Can't a Firewall Do?  Can't protect you against malicious insiders  Can't protect you against connections that don't go through it  Can't protect against completely new threats  Can't protect against viruses 8
  • 9. Types of Firewalls  Packet Filtering Firewall  Application level Gateway  Circuit level gateway 9
  • 10. Architectures for Firewall  Single-Box Architecture 10
  • 12. Making The Firewall Fit  IP address  Domain names  Protocols  Ports 12
  • 13. What It Protects You From  Remote login  SMTP session hijacking  Operating system bugs  Spam  E-mail bombs  Source routing 13
  • 14. Security Strategies implemented  Default Deny  Prohibit all communication that is not expressly permitted  Default Permit  Permit all communication that is not explicitly prohibited  Least Privilege  reduces the authorization level at which various actions are performed  Defense in Depth  security approach whereby each system on the network is secured to the greatest possible degree  Choke Point  forces attackers to use a narrow channel to bypass the network 14
  • 15. Testing a Firewall Configuration 15 • A faster and easier method is available with the Linux firewall  implementation • Allows you to manually generate tests • Suppose our local network is 172.16.1.0 • And we allow only TCP connections
  • 16. Example 16  # ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0 accepted  # ipchains -C forward -p tcp -s 172.16.2.0 1025 -d 44.136.8.2 80 -i eth0 denied  # ipchains -C forward -p udp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0 denied  # ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 23 -i eth0 denied source Destination Wrong Wrong Wrong
  • 19. TESTING A FIREWALL CONFIGURATION THANKU 19