SlideShare a Scribd company logo
PRESENTERS :-
Mohamed Sh Ahmed Mohamed
Presentation :’Firewalls’
1
Table of Contents
2
INTRODUCTION
HOW FIREWALLWORKS
TYPES OF FIREWALLS
MAKING THE FIREWALL FIT
TESTING A FIREWALLCONFIGURATION
CONCLUSION
REFERENCES
Introduction
Is hardware, software, or a combination of both
used to prevent unauthorized programs or Internet
users from accessing a private network and/or a
single computer.
3
Hardware vs. Software Firewalls
4
Hardware Firewalls
 Protect an entire network
 Implemented on the router level
 Usually more expensive, harder to configure
Software Firewalls
 Protect a single computer
 Usually less expensive, easier to configure
How does a software firewall work?
5
Inspects each individual “packet” of data as it arrives
at either side of the firewall
Determines whether it should be allowed to pass
through or if it should be blocked
Firewall Rules
6
Allow – traffic that flows automatically because it
has been deemed
Block – traffic that is blocked because it has been
deemed dangerous to your computer
Ask – asks the user whether or not the traffic is
allowed to pass through
What Can a Firewall Do?
Focus for security decisions
 Stop hackers from accessing your computer
Can enforce security policy
 Protects your personal information
Limits your exposure
 Blocks “pop up” ads and certain cookies
Can log Internet activity efficiently
 Determines which programs can access the Internet
7
What Can't a Firewall Do?
Can't protect you against malicious insiders
Can't protect you against connections that don't go
through it
Can't protect against completely new threats
Can't protect against viruses
8
Types of Firewalls
Packet Filtering Firewall
Application level Gateway
Circuit level gateway
9
Architectures for Firewall
Single-BoxArchitecture
10
Screened Host Architecture
11
Making The Firewall Fit
IP address
Domain names
Protocols
Ports
12
What It Protects You From
Remote login
SMTP session hijacking
Operating system bugs
Spam
E-mail bombs
Source routing
13
Security Strategies implemented
14
Default Deny
 Prohibit all communication that is not expressly permitted
Default Permit
 Permit all communication that is not explicitly prohibited
Least Privilege
 reduces the authorization level at which various actions are
performed
Defense in Depth
 security approach whereby each system on the network is secured
to the greatest possible degree
Choke Point
 forces attackers to use a narrow channel to bypass the network
Testing a Firewall Configuration
15
• A faster and easier method is available with the
Linux firewall
implementation
• Allows you to manually generate tests
• Suppose our local network is 172.16.1.0
• And we allow only TCPconnections
Example
16
# ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 80 -ieth0
accepted
# ipchains -C forward -p tcp -s 172.16.2.0 1025 -d 44.136.8.2 80 -ieth0
denied
# ipchains -C forward -p udp -s 172.16.1.0 1025 -d 44.136.8.2 80 -ieth0
denied
# ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 23 -ieth0
denied
source Destination
Wrong
Wrong
Wrong
REFRENCES
17
www.howstuffworks.com
www.securityfocus.com
www.firewall.com
18
Conclusion
T H A N K U
TESTING A FIREWALLCONFIGURATION
19

More Related Content

Similar to firewallpresentation-100826052003-phpapp02.pptx

Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
sweta dargad
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
Karnav Rana
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
MD SAHABUDDIN
 
Firewalls-Intro
Firewalls-IntroFirewalls-Intro
Firewalls-Intro
Aparna Bulusu
 
Net Defender
Net DefenderNet Defender
Net Defender
krishna maddikara
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
BachaSirata
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
Information Technology
 
Netdefender
NetdefenderNetdefender
Netdefender
krishna Maddikara
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
lamtran367679
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
VC Infotech
 
Firewall
Firewall Firewall
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
BhushanLokhande12
 
Firewall
FirewallFirewall
Firewall
Ydel Capales
 
Network security
Network securityNetwork security
Network security
mustafa aadel
 
Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
Muhammad Baqar Kazmi
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
gaurav96raj
 
Firewall
FirewallFirewall
Firewall
Ahmed Elnaggar
 
Network Security
Network SecurityNetwork Security
Network Security
Fatima Zohra BENHACINE
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
FahmiOlayah
 
Firewall
FirewallFirewall

Similar to firewallpresentation-100826052003-phpapp02.pptx (20)

Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 
Firewalls-Intro
Firewalls-IntroFirewalls-Intro
Firewalls-Intro
 
Net Defender
Net DefenderNet Defender
Net Defender
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Netdefender
NetdefenderNetdefender
Netdefender
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall
Firewall Firewall
Firewall
 
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
 
Firewall
FirewallFirewall
Firewall
 
Network security
Network securityNetwork security
Network security
 
Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Network Security
Network SecurityNetwork Security
Network Security
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
 
Firewall
FirewallFirewall
Firewall
 

More from ApdiazizHussein

laptop-140410150223-phpapp02 (1).pptx
laptop-140410150223-phpapp02 (1).pptxlaptop-140410150223-phpapp02 (1).pptx
laptop-140410150223-phpapp02 (1).pptx
ApdiazizHussein
 
Chapter fIVE.pptx
Chapter fIVE.pptxChapter fIVE.pptx
Chapter fIVE.pptx
ApdiazizHussein
 
dokumen.tips_comptia-a.ppt
dokumen.tips_comptia-a.pptdokumen.tips_comptia-a.ppt
dokumen.tips_comptia-a.ppt
ApdiazizHussein
 
Chapter five.pptx
Chapter five.pptxChapter five.pptx
Chapter five.pptx
ApdiazizHussein
 
Introduction of Course A+.pptx
Introduction of Course A+.pptxIntroduction of Course A+.pptx
Introduction of Course A+.pptx
ApdiazizHussein
 
SGSGS
SGSGSSGSGS
Chapter 9 Questions.pptx
Chapter 9 Questions.pptxChapter 9 Questions.pptx
Chapter 9 Questions.pptx
ApdiazizHussein
 
Chapter 4 Questions.pptx
Chapter 4 Questions.pptxChapter 4 Questions.pptx
Chapter 4 Questions.pptx
ApdiazizHussein
 

More from ApdiazizHussein (8)

laptop-140410150223-phpapp02 (1).pptx
laptop-140410150223-phpapp02 (1).pptxlaptop-140410150223-phpapp02 (1).pptx
laptop-140410150223-phpapp02 (1).pptx
 
Chapter fIVE.pptx
Chapter fIVE.pptxChapter fIVE.pptx
Chapter fIVE.pptx
 
dokumen.tips_comptia-a.ppt
dokumen.tips_comptia-a.pptdokumen.tips_comptia-a.ppt
dokumen.tips_comptia-a.ppt
 
Chapter five.pptx
Chapter five.pptxChapter five.pptx
Chapter five.pptx
 
Introduction of Course A+.pptx
Introduction of Course A+.pptxIntroduction of Course A+.pptx
Introduction of Course A+.pptx
 
SGSGS
SGSGSSGSGS
SGSGS
 
Chapter 9 Questions.pptx
Chapter 9 Questions.pptxChapter 9 Questions.pptx
Chapter 9 Questions.pptx
 
Chapter 4 Questions.pptx
Chapter 4 Questions.pptxChapter 4 Questions.pptx
Chapter 4 Questions.pptx
 

Recently uploaded

IDF 2024 dairy conference. Brochure.pdf
IDF 2024 dairy conference.  Brochure.pdfIDF 2024 dairy conference.  Brochure.pdf
IDF 2024 dairy conference. Brochure.pdf
prasadp100
 
FOOD OBESITY IN NORTH AMERICA ( NEW).pptx
FOOD OBESITY IN NORTH AMERICA ( NEW).pptxFOOD OBESITY IN NORTH AMERICA ( NEW).pptx
FOOD OBESITY IN NORTH AMERICA ( NEW).pptx
kevinfrancis63
 
Heritage Conservation.Strategies and Options for Preserving India Heritage
Heritage Conservation.Strategies and Options for Preserving India HeritageHeritage Conservation.Strategies and Options for Preserving India Heritage
Heritage Conservation.Strategies and Options for Preserving India Heritage
JIT KUMAR GUPTA
 
在线办理(UCM毕业证书)加州大学美熹德分校毕业证文凭证书一模一样
在线办理(UCM毕业证书)加州大学美熹德分校毕业证文凭证书一模一样在线办理(UCM毕业证书)加州大学美熹德分校毕业证文凭证书一模一样
在线办理(UCM毕业证书)加州大学美熹德分校毕业证文凭证书一模一样
7sl9gbvd
 
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
i990go7o
 
快速办理(Adelaide毕业证书)阿德莱德大学毕业证文凭证书一模一样
快速办理(Adelaide毕业证书)阿德莱德大学毕业证文凭证书一模一样快速办理(Adelaide毕业证书)阿德莱德大学毕业证文凭证书一模一样
快速办理(Adelaide毕业证书)阿德莱德大学毕业证文凭证书一模一样
mmmnvxcc
 

Recently uploaded (6)

IDF 2024 dairy conference. Brochure.pdf
IDF 2024 dairy conference.  Brochure.pdfIDF 2024 dairy conference.  Brochure.pdf
IDF 2024 dairy conference. Brochure.pdf
 
FOOD OBESITY IN NORTH AMERICA ( NEW).pptx
FOOD OBESITY IN NORTH AMERICA ( NEW).pptxFOOD OBESITY IN NORTH AMERICA ( NEW).pptx
FOOD OBESITY IN NORTH AMERICA ( NEW).pptx
 
Heritage Conservation.Strategies and Options for Preserving India Heritage
Heritage Conservation.Strategies and Options for Preserving India HeritageHeritage Conservation.Strategies and Options for Preserving India Heritage
Heritage Conservation.Strategies and Options for Preserving India Heritage
 
在线办理(UCM毕业证书)加州大学美熹德分校毕业证文凭证书一模一样
在线办理(UCM毕业证书)加州大学美熹德分校毕业证文凭证书一模一样在线办理(UCM毕业证书)加州大学美熹德分校毕业证文凭证书一模一样
在线办理(UCM毕业证书)加州大学美熹德分校毕业证文凭证书一模一样
 
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
 
快速办理(Adelaide毕业证书)阿德莱德大学毕业证文凭证书一模一样
快速办理(Adelaide毕业证书)阿德莱德大学毕业证文凭证书一模一样快速办理(Adelaide毕业证书)阿德莱德大学毕业证文凭证书一模一样
快速办理(Adelaide毕业证书)阿德莱德大学毕业证文凭证书一模一样
 

firewallpresentation-100826052003-phpapp02.pptx

  • 1. PRESENTERS :- Mohamed Sh Ahmed Mohamed Presentation :’Firewalls’ 1
  • 2. Table of Contents 2 INTRODUCTION HOW FIREWALLWORKS TYPES OF FIREWALLS MAKING THE FIREWALL FIT TESTING A FIREWALLCONFIGURATION CONCLUSION REFERENCES
  • 3. Introduction Is hardware, software, or a combination of both used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. 3
  • 4. Hardware vs. Software Firewalls 4 Hardware Firewalls  Protect an entire network  Implemented on the router level  Usually more expensive, harder to configure Software Firewalls  Protect a single computer  Usually less expensive, easier to configure
  • 5. How does a software firewall work? 5 Inspects each individual “packet” of data as it arrives at either side of the firewall Determines whether it should be allowed to pass through or if it should be blocked
  • 6. Firewall Rules 6 Allow – traffic that flows automatically because it has been deemed Block – traffic that is blocked because it has been deemed dangerous to your computer Ask – asks the user whether or not the traffic is allowed to pass through
  • 7. What Can a Firewall Do? Focus for security decisions  Stop hackers from accessing your computer Can enforce security policy  Protects your personal information Limits your exposure  Blocks “pop up” ads and certain cookies Can log Internet activity efficiently  Determines which programs can access the Internet 7
  • 8. What Can't a Firewall Do? Can't protect you against malicious insiders Can't protect you against connections that don't go through it Can't protect against completely new threats Can't protect against viruses 8
  • 9. Types of Firewalls Packet Filtering Firewall Application level Gateway Circuit level gateway 9
  • 12. Making The Firewall Fit IP address Domain names Protocols Ports 12
  • 13. What It Protects You From Remote login SMTP session hijacking Operating system bugs Spam E-mail bombs Source routing 13
  • 14. Security Strategies implemented 14 Default Deny  Prohibit all communication that is not expressly permitted Default Permit  Permit all communication that is not explicitly prohibited Least Privilege  reduces the authorization level at which various actions are performed Defense in Depth  security approach whereby each system on the network is secured to the greatest possible degree Choke Point  forces attackers to use a narrow channel to bypass the network
  • 15. Testing a Firewall Configuration 15 • A faster and easier method is available with the Linux firewall implementation • Allows you to manually generate tests • Suppose our local network is 172.16.1.0 • And we allow only TCPconnections
  • 16. Example 16 # ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 80 -ieth0 accepted # ipchains -C forward -p tcp -s 172.16.2.0 1025 -d 44.136.8.2 80 -ieth0 denied # ipchains -C forward -p udp -s 172.16.1.0 1025 -d 44.136.8.2 80 -ieth0 denied # ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 23 -ieth0 denied source Destination Wrong Wrong Wrong
  • 19. T H A N K U TESTING A FIREWALLCONFIGURATION 19