SlideShare a Scribd company logo
Firewalls
What is a Firewall?
 A firewall is hardware, software, or a
combination of both that is used to prevent
unauthorized programs or Internet users from
accessing a private network and/or a single
computer
What is a Firewall?
 A choke point of control and monitoring
 Interconnects networks with differing trust
 Imposes restrictions on network services
 only authorized traffic is allowed
 Auditing and controlling access
 can implement alarms for abnormal behavior
Hardware vs. Software Firewalls
 Hardware Firewalls
 Protect an entire network
 Implemented on the router level
 Usually more expensive, harder to configure
 Software Firewalls
 Protect a single computer
 Usually less expensive, easier to configure
Firewall Rules
 Allow – traffic that flows automatically because
it has been deemed as “safe”
 Block – traffic that is blocked because it has
been deemed dangerous to your computer
 Ask – asks the user whether or not the traffic is
allowed to pass through
Classification of Firewall
Characterized by protocol level it controls in
 Packet filtering
 Circuit gateways
 Application gateways
Firewalls – Packet Filters
Looks at each packet entering
or leaving the network and
accepts or rejects it based on
user-defined rules. Packet
filtering is fairly effective and
transparent to users, but it is
difficult to configure. In
addition, it is susceptible
to IP spoofing.
 Packets examined at the network layer
 Useful “first line” of defense - commonly deployed
on routers
 Simple accept or reject decision model
 No awareness of higher protocol layers
Packet Filter
Applications
Presentations
Sessions
Transport
Data Link
Physical
Data Link
Physical
Applications
Presentations
Sessions
Transport
Data Link
Physical
Network
Presentations
Sessions
Transport
Applications
Network Network
Firewalls – Packet Filters
 Simplest of components
 Low cost
 Very fast
 Packet filtering routers stores table containing rules
 Uses transport-layer information only
 IP Source Address, Destination Address
 Protocol/Next Header (TCP, UDP, ICMP, etc)
 Source port number & destination port number
How to Configure a Packet Filter
 Start with a security policy
 Specify allowable packets in terms of logical
expressions on packet fields
 Rewrite expressions in syntax supported by your
vendor
 General rules - least privilege
 All that is not expressly permitted is prohibited
 If you do not need it, eliminate it
Advantages of Packet Filter
 Packet filters are very fast and transparent
 Effective in completely blocking specific types
of traffic
Limitations of Packet firewall
 Filtering list can become very lengthy, quite
complex and error prone
 Cannot support user authentication
Firewall Outlines
 Packet filtering
 Application gateways
 Circuit gateways
 Combination of above is dynamic packet filter
Firewalls - Circuit Level Gateway
Applies security
mechanisms when
a TCP or UDP connection
is established. Once the
connection has been made,
packets can flow between
the hosts without further
checking.
Firewalls - Circuit Level Gateway
 Operates at session layer
 Monitors TCP handshaking b/w packets from
untrusted clients or servers
 Determines whether connection is valid
 Permits traffic only for a limited period
 No check on packets transferred
 Capability of proxying IP addresses
Firewalls - Circuit Level Gateway
 Attributes for validity of connection
 Source and destination IP address
 Time of the day
 Protocol
 User and password
Firewall Outlines
 Packet filtering
 Application gateways
 Circuit gateways
 Combination of above is dynamic packet filter
Firewalls - Application Level
Gateway (or Proxy)
Applies security
mechanisms to specific
applications, such
as FTP and Telnet servers.
This is very effective, but
can impose a performance
degradation.
Application Gateway or Proxy
Applications
Presentations
Sessions
Transport
Data Link
Physical
Data Link
Physical
Applications
Presentations
Sessions
Transport
Data Link
Physical
Network Network
Network
Presentations
Sessions
Transport
Applications
 Act as a proxy for applications
 Packets examined at the application layer
 Application/Content filtering possible - prevent
FTP “put” commands, for example
 Modest performance
Application-Level Filtering
 Has full access to protocol
 user requests service from proxy
 proxy validates request as legal
 then actions request and returns result to user
 Need separate proxies for each service
 E.g., SMTP (E-Mail)
 NNTP (Net news)
 DNS (Domain Name System)
 NTP (Network Time Protocol)
 custom services generally not supported
Application-Level Filtering
 Most secure
 Proxies can be configured to encrypt
 Complicated configuration
 Performance degrades as the number of
connections go up
What a personal firewall can do
 Stop hackers from accessing your computer
 Protects your personal information
 Blocks “pop up” ads and certain cookies
 Determines which programs can access the
Internet
What a personal firewall cannot do
 Cannot prevent e-mail viruses
 Only an antivirus product with updated definitions
can prevent e-mail viruses
 After setting it initially, you can forget about it
 The firewall will require periodic updates to the
rulesets and the software itself

More Related Content

Similar to Unit II Chapter 6 firewalls.ppt

Firewall
FirewallFirewall
Firewall
Muuluu
 
Firewall
FirewallFirewall
Firewalls
FirewallsFirewalls
Firewalls
Sanjeevsharma620
 
Firewall
FirewallFirewall
Firewall
Saurabh Chauhan
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
Puneet Bawa
 
Firewalls
FirewallsFirewalls
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
Mohammed Maajidh
 
Firewall
FirewallFirewall
Firewall
lmbriscoe
 
Firewall Modified
Firewall ModifiedFirewall Modified
Firewall Modified
Ritesh Verma
 
Firewall
FirewallFirewall
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
ShreyaBanerjee52
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
Karnav Rana
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
saad504633
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
rahul kundu
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
Prabhdeep Kaur
 
Firewalls
FirewallsFirewalls
Network security
Network securityNetwork security
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
Raj Kumar
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 

Similar to Unit II Chapter 6 firewalls.ppt (20)

Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Firewalls
FirewallsFirewalls
Firewalls
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall
FirewallFirewall
Firewall
 
Firewall Modified
Firewall ModifiedFirewall Modified
Firewall Modified
 
Firewall
FirewallFirewall
Firewall
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network security
Network securityNetwork security
Network security
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 

Recently uploaded

E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
aymanquadri279
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Envertis Software Solutions
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 

Recently uploaded (20)

E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 

Unit II Chapter 6 firewalls.ppt

  • 2. What is a Firewall?  A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer
  • 3. What is a Firewall?  A choke point of control and monitoring  Interconnects networks with differing trust  Imposes restrictions on network services  only authorized traffic is allowed  Auditing and controlling access  can implement alarms for abnormal behavior
  • 4. Hardware vs. Software Firewalls  Hardware Firewalls  Protect an entire network  Implemented on the router level  Usually more expensive, harder to configure  Software Firewalls  Protect a single computer  Usually less expensive, easier to configure
  • 5. Firewall Rules  Allow – traffic that flows automatically because it has been deemed as “safe”  Block – traffic that is blocked because it has been deemed dangerous to your computer  Ask – asks the user whether or not the traffic is allowed to pass through
  • 6. Classification of Firewall Characterized by protocol level it controls in  Packet filtering  Circuit gateways  Application gateways
  • 7. Firewalls – Packet Filters Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.
  • 8.  Packets examined at the network layer  Useful “first line” of defense - commonly deployed on routers  Simple accept or reject decision model  No awareness of higher protocol layers Packet Filter Applications Presentations Sessions Transport Data Link Physical Data Link Physical Applications Presentations Sessions Transport Data Link Physical Network Presentations Sessions Transport Applications Network Network
  • 9. Firewalls – Packet Filters  Simplest of components  Low cost  Very fast  Packet filtering routers stores table containing rules  Uses transport-layer information only  IP Source Address, Destination Address  Protocol/Next Header (TCP, UDP, ICMP, etc)  Source port number & destination port number
  • 10. How to Configure a Packet Filter  Start with a security policy  Specify allowable packets in terms of logical expressions on packet fields  Rewrite expressions in syntax supported by your vendor  General rules - least privilege  All that is not expressly permitted is prohibited  If you do not need it, eliminate it
  • 11. Advantages of Packet Filter  Packet filters are very fast and transparent  Effective in completely blocking specific types of traffic
  • 12. Limitations of Packet firewall  Filtering list can become very lengthy, quite complex and error prone  Cannot support user authentication
  • 13. Firewall Outlines  Packet filtering  Application gateways  Circuit gateways  Combination of above is dynamic packet filter
  • 14. Firewalls - Circuit Level Gateway Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
  • 15. Firewalls - Circuit Level Gateway  Operates at session layer  Monitors TCP handshaking b/w packets from untrusted clients or servers  Determines whether connection is valid  Permits traffic only for a limited period  No check on packets transferred  Capability of proxying IP addresses
  • 16. Firewalls - Circuit Level Gateway  Attributes for validity of connection  Source and destination IP address  Time of the day  Protocol  User and password
  • 17. Firewall Outlines  Packet filtering  Application gateways  Circuit gateways  Combination of above is dynamic packet filter
  • 18. Firewalls - Application Level Gateway (or Proxy) Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
  • 19. Application Gateway or Proxy Applications Presentations Sessions Transport Data Link Physical Data Link Physical Applications Presentations Sessions Transport Data Link Physical Network Network Network Presentations Sessions Transport Applications  Act as a proxy for applications  Packets examined at the application layer  Application/Content filtering possible - prevent FTP “put” commands, for example  Modest performance
  • 20. Application-Level Filtering  Has full access to protocol  user requests service from proxy  proxy validates request as legal  then actions request and returns result to user  Need separate proxies for each service  E.g., SMTP (E-Mail)  NNTP (Net news)  DNS (Domain Name System)  NTP (Network Time Protocol)  custom services generally not supported
  • 21. Application-Level Filtering  Most secure  Proxies can be configured to encrypt  Complicated configuration  Performance degrades as the number of connections go up
  • 22. What a personal firewall can do  Stop hackers from accessing your computer  Protects your personal information  Blocks “pop up” ads and certain cookies  Determines which programs can access the Internet
  • 23. What a personal firewall cannot do  Cannot prevent e-mail viruses  Only an antivirus product with updated definitions can prevent e-mail viruses  After setting it initially, you can forget about it  The firewall will require periodic updates to the rulesets and the software itself