SlideShare a Scribd company logo
1 of 16
PREPARED BY : PINA CHHATRALA 1
Milestone
 Types of Firewalls
 Packet filtering firewall
 Application proxy firewall
 Stateful inspection firewall
 Circuit – level proxy firewall
PREPARED BY : PINA CHHATRALA 2
PREPARED BY : PINA CHHATRALA 3
Types of Firewall
Packet Filtering Firewall
PREPARED BY : PINA CHHATRALA 4
Packet Filtering Firewall
 A packet filtering firewall applies a set of rules to each incoming
and outgoing IP packet and then forwards or discards the
packet.
 Filtering rules are based on information contained in a network
packet.
 Source IP address
 Destination IP address
 Source and destination transport level address
 IP protocol field
 Interface
PREPARED BY : PINA CHHATRALA 5
Packet Filtering Firewall
 Two default policies are there to take default action to
determine whether to forward or discard the packet.
 Default = discard
 Default = forward
 Some possible attacks on firewall :
 IP address spoofing
 Source routing attacks
 Tiny fragment attacks
PREPARED BY : PINA CHHATRALA 6
Packet Filtering Firewall
 Advantage :
 Cost
 Low resource usage
 Best suited for smaller network
 Disadvantage :
 Can work only on the network layer
 Do not support complex rule based support
 Vulnerable to spoofing
PREPARED BY : PINA CHHATRALA 7
Application Proxy Firewall
PREPARED BY : PINA CHHATRALA 8
Application Proxy Firewall
 An application – level gateway, also called an application proxy,
acts as a rely of application – level traffic.
 user requests service from proxy.
 proxy validates request as legal.
 then actions request and returns result to user.
 can log / audit traffic at application level.
PREPARED BY : PINA CHHATRALA 9
Application Proxy Firewall
 Advantage :
 More secure than packet filter firewalls
 Easy to log and audit incoming traffic
 Disadvantage :
 Additional processing overhead on each connection
PREPARED BY : PINA CHHATRALA 10
Stateful Inspection Firewall
 A stateful inspection packet firewall tightens up the rules for TCP
traffic by creating a directory of outbound TCP connections.
 There is an entry for each currently established connection.
 The packet filter now allow incoming traffic to high – numbered
ports only for those packets that fit the profile of one of the
entries in this directory.
 A stateful packet inspection firewall reviews the same packet
information as a packet filtering firewall, but also records
information about TCP connections.
PREPARED BY : PINA CHHATRALA 11
Stateful Inspection Firewall
 Advantage :
 can work on a transparent mode allowing direct
connections between the client and the server
 can also implement algorithms and complex security
models which are protocol specific, making the
connections and data transfer more secure
PREPARED BY : PINA CHHATRALA 12
Circuit – level Firewall
PREPARED BY : PINA CHHATRALA 13
Circuit – level Firewall
 This can be a stand – alone system or it can be a specialized
functions performed by an application – level gateway for
certain applications.
 It does not permit an end – to – end TCP connection; rather, the
gateway sets two TCP connections.
 A typical use of the circuit – level gateway is a situation in which
the system administrator trusts the internal users.
 The gateway can be configured to support application – level or
proxy service on inbound connections and circuit – level
functions for outbound connections.
PREPARED BY : PINA CHHATRALA 14
Circuit – level Firewall
 Advantage :
 comparatively inexpensive and provide Anonymity to the
private network.
 Disadvantage :
 do not filter Individual Packets
PREPARED BY : PINA CHHATRALA 15
PREPARED BY : PINA CHHATRALA 16

More Related Content

What's hot

Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
asimnawaz54
 

What's hot (20)

Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Active and Passive Network Attacks
Active and Passive Network AttacksActive and Passive Network Attacks
Active and Passive Network Attacks
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Firewalls
FirewallsFirewalls
Firewalls
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
IP Security
IP SecurityIP Security
IP Security
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall
 
Network security
Network securityNetwork security
Network security
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Basing
Firewall BasingFirewall Basing
Firewall Basing
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 

Viewers also liked (16)

Firewalls
FirewallsFirewalls
Firewalls
 
Mime presentation
Mime presentationMime presentation
Mime presentation
 
Mime
MimeMime
Mime
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Firewall
Firewall Firewall
Firewall
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber law
Cyber lawCyber law
Cyber law
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Types of firewall

Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Suemi Iarussi
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; Firewalls
Marrion Kujinga
 

Similar to Types of firewall (20)

Firewall
FirewallFirewall
Firewall
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
Firewalls (6)
Firewalls (6)Firewalls (6)
Firewalls (6)
 
Firewall
FirewallFirewall
Firewall
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
W4 profinet frame analysis, peter thomas
W4 profinet frame analysis, peter thomasW4 profinet frame analysis, peter thomas
W4 profinet frame analysis, peter thomas
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
 
100197
100197100197
100197
 
Vp npresentation 2
Vp npresentation 2Vp npresentation 2
Vp npresentation 2
 
Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptx
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
FIREWALL
FIREWALLFIREWALL
FIREWALL
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; Firewalls
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Types of firewall

  • 1. PREPARED BY : PINA CHHATRALA 1
  • 2. Milestone  Types of Firewalls  Packet filtering firewall  Application proxy firewall  Stateful inspection firewall  Circuit – level proxy firewall PREPARED BY : PINA CHHATRALA 2
  • 3. PREPARED BY : PINA CHHATRALA 3 Types of Firewall
  • 4. Packet Filtering Firewall PREPARED BY : PINA CHHATRALA 4
  • 5. Packet Filtering Firewall  A packet filtering firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.  Filtering rules are based on information contained in a network packet.  Source IP address  Destination IP address  Source and destination transport level address  IP protocol field  Interface PREPARED BY : PINA CHHATRALA 5
  • 6. Packet Filtering Firewall  Two default policies are there to take default action to determine whether to forward or discard the packet.  Default = discard  Default = forward  Some possible attacks on firewall :  IP address spoofing  Source routing attacks  Tiny fragment attacks PREPARED BY : PINA CHHATRALA 6
  • 7. Packet Filtering Firewall  Advantage :  Cost  Low resource usage  Best suited for smaller network  Disadvantage :  Can work only on the network layer  Do not support complex rule based support  Vulnerable to spoofing PREPARED BY : PINA CHHATRALA 7
  • 8. Application Proxy Firewall PREPARED BY : PINA CHHATRALA 8
  • 9. Application Proxy Firewall  An application – level gateway, also called an application proxy, acts as a rely of application – level traffic.  user requests service from proxy.  proxy validates request as legal.  then actions request and returns result to user.  can log / audit traffic at application level. PREPARED BY : PINA CHHATRALA 9
  • 10. Application Proxy Firewall  Advantage :  More secure than packet filter firewalls  Easy to log and audit incoming traffic  Disadvantage :  Additional processing overhead on each connection PREPARED BY : PINA CHHATRALA 10
  • 11. Stateful Inspection Firewall  A stateful inspection packet firewall tightens up the rules for TCP traffic by creating a directory of outbound TCP connections.  There is an entry for each currently established connection.  The packet filter now allow incoming traffic to high – numbered ports only for those packets that fit the profile of one of the entries in this directory.  A stateful packet inspection firewall reviews the same packet information as a packet filtering firewall, but also records information about TCP connections. PREPARED BY : PINA CHHATRALA 11
  • 12. Stateful Inspection Firewall  Advantage :  can work on a transparent mode allowing direct connections between the client and the server  can also implement algorithms and complex security models which are protocol specific, making the connections and data transfer more secure PREPARED BY : PINA CHHATRALA 12
  • 13. Circuit – level Firewall PREPARED BY : PINA CHHATRALA 13
  • 14. Circuit – level Firewall  This can be a stand – alone system or it can be a specialized functions performed by an application – level gateway for certain applications.  It does not permit an end – to – end TCP connection; rather, the gateway sets two TCP connections.  A typical use of the circuit – level gateway is a situation in which the system administrator trusts the internal users.  The gateway can be configured to support application – level or proxy service on inbound connections and circuit – level functions for outbound connections. PREPARED BY : PINA CHHATRALA 14
  • 15. Circuit – level Firewall  Advantage :  comparatively inexpensive and provide Anonymity to the private network.  Disadvantage :  do not filter Individual Packets PREPARED BY : PINA CHHATRALA 15
  • 16. PREPARED BY : PINA CHHATRALA 16

Editor's Notes

  1. TCP connections : one between itself and a TCP user on an inner host and one between itself and TCP user on an outside host.
  2. Disadvantage : Circuit level Gateways do not filter Individual Packets. After Establishing a Connection, an Attacker may take advantage of this.