Firewalls:
Presented by:
Nikhil E R
USN:1DA17MCA79
Definition -
What
does Firewall mean?
‱ A firewall is software used to maintain
the security of a private network.
‱ Firewalls block unauthorized access to
or from private networks and are often
employed to prevent unauthorized Web
users or illicit software from gaining
access to private networks connected to
the Internet.
‱ A firewall may be implemented using
hardware, software, or a combination of
both.
‱ A firewall is recognized as the first line of
defense in securing sensitive information.
For better safety, the data can be encrypted.
Contoso Ltd.
Lorem ipsum dolor sit amet, consectetur
adipiscing elit. Etiam aliquet eu mi quis
lacinia. Ut fermentum a magna ut.
3
WHY TO USE
FIREWALLS?
Firewall is considered as an essential element
to achieve network security for the following
reasons:
‱Internal network and hosts are unlikely to be
properly secured.
‱Internet is a dangerous place with criminals,
users from competing companies, disgruntled
ex-employees, spies from unfriendly
countries, vandals, etc.
‱To prevent an attacker from launching denial
of service attacks on network resource.
‱To prevent illegal modification/access to
internal data by an outsider attacker.
Contoso Ltd.
Types of Firewalls:
Firewall is categorized into three basic types −
4
Milestone
‱Packet filter
‱Application-level gateway
‱Circuit-level gateway
Contoso Ltd.
PacketFilteringFirewall
○ Allow or block the packets mostly
based on criteria such as source and/or
destination IP addresses, protocol,
source and/or destination port
numbers, and various other parameters
within the IP header.
○ The decision can be based on factors
other than IP header fields such as
ICMP message type, TCP SYN and ACK
bits, etc.
○ Packet filter rule has two parts −
○ Selection criteria − It is a used as a
condition and pattern matching for
decision making.
○ Action field − This part specifies action
to be taken if an IP packet meets the
selection criteria. The action could be
either block (deny) or permit (allow)
the packet across the firewall.
Add a footer
5
Contoso Ltd.
○ Cost
○ Low resource usage
○ Best suited for small network
Disadvantges:
‱ Can work only on the network layer
‱ Do not support complex rule based support
‱ Vulnerable to spoofing
6
Add a footer
Advantges:
Contoso Ltd.
Proxy Firewalls(Applicationlevel Firewalls)
○ The more sophisticated proxy or application layer
firewalls deal with network traffic by passing all
packets through a separate “proxy” application
that examines data at an application level.
○ A proxy firewall doesn’t allow a direct connection
between your network and the Internet. Instead it
accepts requests and executes them on behalf of
the user.
○ This proxy system enables you to set a firewall to
accept or reject packets based on addresses, port
information and application information. For
instance, you can set the firewall to filter out all
incoming packets belonging to EXE files, which are
often infected with viruses and worms. Proxy
firewalls generally keep very detailed logs,
including information on the data portions of
packets.
Add a footer
7
Contoso Ltd.
‱ More secure than packet filter firewalls
‱ Easy to log and audit incoming traffic
Disadvantages:
‱ Additional processing overhead on each connection
8
Add a footer
Advantages:
Contoso Ltd.
HybridFirewall(circuit-levelgateway):
○ This can be a stand – alone system or it can be a
specialized functions performed by an application –
level gateway for certain applications.
○ It does not permit an end – to – end TCP connection;
rather, the gateway sets two TCP connections.
○ A typical use of the circuit – level gateway is a situation
in which the system administrator trusts the internal
users.
○ The gateway can be configured to support application –
level or proxy service on inbound connections and
circuit – level functions for outbound connections.
Add a footer
9
Contoso Ltd.
○ Comparatively inexpensive and provide Anonymity to the private network.
Disadvantage :
‱ Do not filter Individual Packets
10
Add a footer
Advantages:
Thank You
NIKHIL ER

Firewalls And its types in cyber security

  • 1.
  • 2.
    Definition - What does Firewallmean? ‱ A firewall is software used to maintain the security of a private network. ‱ Firewalls block unauthorized access to or from private networks and are often employed to prevent unauthorized Web users or illicit software from gaining access to private networks connected to the Internet. ‱ A firewall may be implemented using hardware, software, or a combination of both. ‱ A firewall is recognized as the first line of defense in securing sensitive information. For better safety, the data can be encrypted.
  • 3.
    Contoso Ltd. Lorem ipsumdolor sit amet, consectetur adipiscing elit. Etiam aliquet eu mi quis lacinia. Ut fermentum a magna ut. 3 WHY TO USE FIREWALLS? Firewall is considered as an essential element to achieve network security for the following reasons: ‱Internal network and hosts are unlikely to be properly secured. ‱Internet is a dangerous place with criminals, users from competing companies, disgruntled ex-employees, spies from unfriendly countries, vandals, etc. ‱To prevent an attacker from launching denial of service attacks on network resource. ‱To prevent illegal modification/access to internal data by an outsider attacker.
  • 4.
    Contoso Ltd. Types ofFirewalls: Firewall is categorized into three basic types − 4 Milestone ‱Packet filter ‱Application-level gateway ‱Circuit-level gateway
  • 5.
    Contoso Ltd. PacketFilteringFirewall ○ Allowor block the packets mostly based on criteria such as source and/or destination IP addresses, protocol, source and/or destination port numbers, and various other parameters within the IP header. ○ The decision can be based on factors other than IP header fields such as ICMP message type, TCP SYN and ACK bits, etc. ○ Packet filter rule has two parts − ○ Selection criteria − It is a used as a condition and pattern matching for decision making. ○ Action field − This part specifies action to be taken if an IP packet meets the selection criteria. The action could be either block (deny) or permit (allow) the packet across the firewall. Add a footer 5
  • 6.
    Contoso Ltd. ○ Cost ○Low resource usage ○ Best suited for small network Disadvantges: ‱ Can work only on the network layer ‱ Do not support complex rule based support ‱ Vulnerable to spoofing 6 Add a footer Advantges:
  • 7.
    Contoso Ltd. Proxy Firewalls(ApplicationlevelFirewalls) ○ The more sophisticated proxy or application layer firewalls deal with network traffic by passing all packets through a separate “proxy” application that examines data at an application level. ○ A proxy firewall doesn’t allow a direct connection between your network and the Internet. Instead it accepts requests and executes them on behalf of the user. ○ This proxy system enables you to set a firewall to accept or reject packets based on addresses, port information and application information. For instance, you can set the firewall to filter out all incoming packets belonging to EXE files, which are often infected with viruses and worms. Proxy firewalls generally keep very detailed logs, including information on the data portions of packets. Add a footer 7
  • 8.
    Contoso Ltd. ‱ Moresecure than packet filter firewalls ‱ Easy to log and audit incoming traffic Disadvantages: ‱ Additional processing overhead on each connection 8 Add a footer Advantages:
  • 9.
    Contoso Ltd. HybridFirewall(circuit-levelgateway): ○ Thiscan be a stand – alone system or it can be a specialized functions performed by an application – level gateway for certain applications. ○ It does not permit an end – to – end TCP connection; rather, the gateway sets two TCP connections. ○ A typical use of the circuit – level gateway is a situation in which the system administrator trusts the internal users. ○ The gateway can be configured to support application – level or proxy service on inbound connections and circuit – level functions for outbound connections. Add a footer 9
  • 10.
    Contoso Ltd. ○ Comparativelyinexpensive and provide Anonymity to the private network. Disadvantage : ‱ Do not filter Individual Packets 10 Add a footer Advantages:
  • 11.