SlideShare a Scribd company logo
1 of 18
 A firewall can either be software-based or
hardware-based and is used to help keep a
network secure. A system designed to
prevent unauthorized access to or from a
private network. Firewalls can be
implemented in both hardware and software,
or a combination of both
 Network layer firewall
 Application layer firewall
 Circuit layer firewall
 Stateful multi-layer inspection firewall
 Proxy firewall
 Host-based firewall
 Packet filtering
 Hybrid firewall
 The first generation of firewalls (c. 1988) worked
at the network level by inspecting packet
headers and filtering traffic based on the IP
address of the source and the destination, the
port and the service. Some of these primeval
security applications could also filter packets
based on protocols, the domain name of the
source and a few other attributes.
 One important difference about many network
layer firewalls is that they route traffic directly
through them, which means in order to use one,
you either need to have a validly-assigned IP
address block or a private Internet address block
 Application-level firewalls (sometimes called
proxies) have been looking more deeply into
the application data going through their
filters. Application layer firewalls defined,
are hosts running proxy servers, which
permit no traffic directly between networks,
and they perform elaborate logging and
examination of traffic passing through them
 Application-level filtering may include
protection against spam and viruses as well,
and be able to block undesirable Web sites
based on content rather than just their IP
address.
 These applications, which represent the second-
generation of firewall technology, monitor TCP
handshaking between packets to make sure a session
is legitimate. Traffic is filtered based on specified
session rules and may be restricted to recognized
computers only. Circuit-level firewalls hide the
network itself from the outside, which is useful for
denying access to intruders. But they don't filter
individual packets. Applies security mechanism when
a TCP or UDP connection is established. Once the
connection has been made, packets can flow
between the hosts without further checking. Circuit
gateways firewalls function at the network transport
layer. They allow or deny connections based on
addresses and prevent direct connection between
networks
 Stateful multilayer inspection firewalls
combine the aspects of the other three types
of firewalls. SML vendors claim that their
products deploy the best features of the
other three firewall types. They filter
packets at the network level and they
recognize and process application-level data,
but since they don't employ proxies, they
deliver reasonably good performance in spite
of the deep packet analysis
 Proxy firewalls offer more security than other
types of firewalls, but this is at the expense of
speed and functionality, as they can limit which
applications your network can support.
 Proxy firewalls also provide comprehensive,
protocol-aware security analysis for the
protocols they support.
 This allows them to make better security
decisions than products that focus purely on
packet header information.
 Intercepts all messages entering and leaving the
network.
 The proxy server efficiently hides the true
network addresses.
 Network perimeter firewalls cannot provide
protection for traffic generated inside a
trusted network. For this reason, host-based
firewalls running on individual computers are
needed. Host-based firewalls, of which
Windows Firewall with Advanced Security is
an example, protect a host from
unauthorized access and attack.
 Firewalls fall into four broad categories: packet
filters, circuit level gateways, application level
gateways and stateful multilayer inspection
firewalls.
 Packet filtering firewalls work at the network
level of the OSI model, or the IP layer of TCP/IP
 They are usually part of a router. A router is a
device that receives packets from one network
and forwards them to another network. In a
packet filtering firewall each packet is compared
to a set of criteria before it is forwarded
 Static Filtering – is being implemented by
most routers. Rules of filters are adjusted
manually.
 Dynamic Filtering – allows filtering rules to
change depending on responses to outside
processes.
 Hybrid firewalls as the name suggests,
represent a combination of technologies. A
hybrid firewall may consist of a pocket
filtering combined with an application proxy
firewall, or a circuit gateway combined with
an application proxy firewall.
List of firewall using in Linux operating system?
 Lptables
 Lpcop
 Shorewall
 UFW – Uncomplicated Firewall
 OpenBSD and PF
 EBox platform
 Monowall
 Clear os
 pfSense
 Smoothwall Advanced
List of firewall using in Windows operating system?
 Zone Alarm firewall
 Shardaccess
 Mpssvc
firewall and its types

More Related Content

What's hot

Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
rahul kundu
 
Firewall
FirewallFirewall
Firewall
Apo
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 

What's hot (20)

Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Firewall
FirewallFirewall
Firewall
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Firewalls
FirewallsFirewalls
Firewalls
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Firewalls
FirewallsFirewalls
Firewalls
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 

Similar to firewall and its types

WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
vinay arora
 

Similar to firewall and its types (20)

Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptxCSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptx
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
 
Firewall
FirewallFirewall
Firewall
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
What is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxWhat is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptx
 
Network Firewall.pptx
Network Firewall.pptxNetwork Firewall.pptx
Network Firewall.pptx
 
Firewalls
FirewallsFirewalls
Firewalls
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxFirewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptx
 
Firewalls
FirewallsFirewalls
Firewalls
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 

Recently uploaded

Recently uploaded (20)

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

firewall and its types

  • 1.
  • 2.  A firewall can either be software-based or hardware-based and is used to help keep a network secure. A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both
  • 3.  Network layer firewall  Application layer firewall  Circuit layer firewall  Stateful multi-layer inspection firewall  Proxy firewall  Host-based firewall  Packet filtering  Hybrid firewall
  • 4.  The first generation of firewalls (c. 1988) worked at the network level by inspecting packet headers and filtering traffic based on the IP address of the source and the destination, the port and the service. Some of these primeval security applications could also filter packets based on protocols, the domain name of the source and a few other attributes.  One important difference about many network layer firewalls is that they route traffic directly through them, which means in order to use one, you either need to have a validly-assigned IP address block or a private Internet address block
  • 5.
  • 6.  Application-level firewalls (sometimes called proxies) have been looking more deeply into the application data going through their filters. Application layer firewalls defined, are hosts running proxy servers, which permit no traffic directly between networks, and they perform elaborate logging and examination of traffic passing through them  Application-level filtering may include protection against spam and viruses as well, and be able to block undesirable Web sites based on content rather than just their IP address.
  • 7.
  • 8.  These applications, which represent the second- generation of firewall technology, monitor TCP handshaking between packets to make sure a session is legitimate. Traffic is filtered based on specified session rules and may be restricted to recognized computers only. Circuit-level firewalls hide the network itself from the outside, which is useful for denying access to intruders. But they don't filter individual packets. Applies security mechanism when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. Circuit gateways firewalls function at the network transport layer. They allow or deny connections based on addresses and prevent direct connection between networks
  • 9.
  • 10.  Stateful multilayer inspection firewalls combine the aspects of the other three types of firewalls. SML vendors claim that their products deploy the best features of the other three firewall types. They filter packets at the network level and they recognize and process application-level data, but since they don't employ proxies, they deliver reasonably good performance in spite of the deep packet analysis
  • 11.
  • 12.  Proxy firewalls offer more security than other types of firewalls, but this is at the expense of speed and functionality, as they can limit which applications your network can support.  Proxy firewalls also provide comprehensive, protocol-aware security analysis for the protocols they support.  This allows them to make better security decisions than products that focus purely on packet header information.  Intercepts all messages entering and leaving the network.  The proxy server efficiently hides the true network addresses.
  • 13.  Network perimeter firewalls cannot provide protection for traffic generated inside a trusted network. For this reason, host-based firewalls running on individual computers are needed. Host-based firewalls, of which Windows Firewall with Advanced Security is an example, protect a host from unauthorized access and attack.
  • 14.  Firewalls fall into four broad categories: packet filters, circuit level gateways, application level gateways and stateful multilayer inspection firewalls.  Packet filtering firewalls work at the network level of the OSI model, or the IP layer of TCP/IP  They are usually part of a router. A router is a device that receives packets from one network and forwards them to another network. In a packet filtering firewall each packet is compared to a set of criteria before it is forwarded
  • 15.  Static Filtering – is being implemented by most routers. Rules of filters are adjusted manually.  Dynamic Filtering – allows filtering rules to change depending on responses to outside processes.
  • 16.  Hybrid firewalls as the name suggests, represent a combination of technologies. A hybrid firewall may consist of a pocket filtering combined with an application proxy firewall, or a circuit gateway combined with an application proxy firewall.
  • 17. List of firewall using in Linux operating system?  Lptables  Lpcop  Shorewall  UFW – Uncomplicated Firewall  OpenBSD and PF  EBox platform  Monowall  Clear os  pfSense  Smoothwall Advanced List of firewall using in Windows operating system?  Zone Alarm firewall  Shardaccess  Mpssvc