SlideShare a Scribd company logo
1 of 30
 Define what is firewall ?
 Need of firewall
 Types of firewall
› Hardware firewall
 Advantage and disadvantage
› Software firewall
 Advantage and disadvantage
 Types of firewall techniques
› Packet filter
 Drawback of packet filtering
› Application gateway
 advantage
› Circuit-level gateway
› Bastion host
 What a personal firewall can do
 What a personal firewall can not do
 Manufacturing companies
 Firewall is device that provides secure
connectivity between
networks(internal/external).
 A firewall may be a hardware, software of a
combination of both that is used to prevent
unauthorized program or internet users from
accessing a private network or a single
computer.
 All message entering or leaving the intranet
pass through the firewall, which examines
each message & blocks those that do not
meet the specified security criteria.
 To protect confidential
information from those
who do not explicitly need
to access it.
 To protect our network &
its resources from
malicious users &
accidents that originate
outside of our network.
 Hardware firewall
 Software firewall
 It is a physical device.
 It can be installed
between the modem and
computer.
 It can be incorporated
into a broadband router
being used to share the
internet connection.
 Protect an entire network.
 Usually more expensive, header to configure
 E.g.- Cisco pix, netscreen, watchfuard etc.
 Uses very little system resources.
 More secure
 Enhanced security control
 Dedicated hardware firewalls are typically more
reliable
 Easy to disable or remove
 Work independently of associated computer
system.
 Install process is more demanding both
physically and mentally.
 Takes up physical work space
 More expensive
 Harder to upgrade and repair
 It is a software
application.
 It is installed onto the
computer system that
you wish to protect .
 Protect a single computer
 This is usually the computer with modem
attached to it.
 Usually less expensive, easier to configure
 E.g.- Norton internet security, MacAfee
internet security etc.
 Considerably cheaper or even free.
 Simple to install and upgrade
 Requires no physical changes to hardware
or network
 Ideal for home/family use
 Takes up no physical space.
 Software may crash or be incompatible with
system
 Can be difficult to completely disable &
especially remove
 Software bugs may compromise security
 Can be resource hungry
 Incompatibilities with OS.
 Packet filter
 Application gateway/proxy server/proxy
application gateway
 Circuit-level gateway
 Bastion host
 It looks at each packet entering or leaving
the network accepts or rejects it based on
user-defined rules.
Applications
Presentations
Sessions
Transport
Data Link
Physical
Data Link
Physical
Router
Applications
Presentations
Sessions
Transport
Data Link
Physical
Network Network
 Packet filtering is fairly effective &
transparent to users, but it is difficult to
configure.
 In addition, it is susceptible to IP spoofing.
 Drawback of packet filtering technique:-
i. Packet filtering rules can be complex.
ii. Logging facility is not provided by such
firewall.
iii. If TCP/IP packet filtering is not implemented
fully, it can lead to security hole.
iv. Cannot handle RPC (remote produce calls)
 In such type of firewall remote host or
network can interact only with proxy server,
proxy server is responsible for hiding the
details of the internal network i.e. intranet.
 Users uses TCP/IP application, such as FTP
& Telnet servers.
Applications
Presentations
Sessions
Transport
Data Link
Physical
Network
Data Link
Physical
Applications
Presentations
Sessions
Transport
Data Link
Physical
Application Gateway
Applications
Presentations
Sessions
Transport
Network Network
Telnet HTTPFTP
 This is very effective, but can impose a
performance degradation.
 Advantages of application gateway:-
i. Less complex filter rules
ii. Cost effectiveness
iii. Robust authentication & logging facility
iv. Proxy authenticates only those services for
v. Which it is configured/installed.
 It is a stand alone application.
 It does not permit end-to-end TCP connection. it
sets up 2 TCP connection:-
• Between itself and a TCP user on an inner host.
• Between itself and a TCP user on an outer host.
 Bastion host is a special purpose computer
on a network specifically designed and
configured to withstand attacks.
 It generally hosts a single application,
provides platform for application gateway
and circuit-level gateway.
 It supports limited/specific applications to
reduce the threat to the computer.
 Include application-Telnet, SMTP, FTP
 Stop hackers from accessing your
computer.
 Protect your personal information.
 Blocks “pop up” ads and certain
cookies.
 Determines which programs can
access the internet.
 Block invalid packets.
 Cannot prevent e-mail
viruses
-only an antivirus product
with update definitions
can prevent e-mail viruses.
 After setting it initially,
you cannot forget about it
-The firewall will require
periodic updates to the rule sets and the software itself.
 Cisco system, Inc.
 Nortel networks corporation
 Juniper networks, Inc.
 MacAfee, Inc.
 3com corporation
 Citrix systems, Inc
Introduction of firewall slides

More Related Content

What's hot

Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
emin_oz
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 

What's hot (20)

Firewall
FirewallFirewall
Firewall
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Vpn
VpnVpn
Vpn
 
Traditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation FirewallTraditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
Firewall Firewall
Firewall
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 

Similar to Introduction of firewall slides

Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
mordannon
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
mordannon
 

Similar to Introduction of firewall slides (20)

INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
Firewall
FirewallFirewall
Firewall
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Day4
Day4Day4
Day4
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Firewall
FirewallFirewall
Firewall
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
 
Kerberos
KerberosKerberos
Kerberos
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
محمد
محمدمحمد
محمد
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 

More from rahul kundu (17)

Material management
Material managementMaterial management
Material management
 
Business function in organization
Business function in organizationBusiness function in organization
Business function in organization
 
Document object model(dom)
Document object model(dom)Document object model(dom)
Document object model(dom)
 
Document object model(dom)
Document object model(dom)Document object model(dom)
Document object model(dom)
 
Dhtml
DhtmlDhtml
Dhtml
 
Sgml
SgmlSgml
Sgml
 
Internet
InternetInternet
Internet
 
Type of internet connectivity
Type of internet connectivityType of internet connectivity
Type of internet connectivity
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
 
Electronic payment system(EPS)
Electronic payment system(EPS)Electronic payment system(EPS)
Electronic payment system(EPS)
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
 
Electronic data-interchange slides
Electronic data-interchange slidesElectronic data-interchange slides
Electronic data-interchange slides
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
Virus slides
Virus slidesVirus slides
Virus slides
 
Mpeg 7 slides
Mpeg 7 slides Mpeg 7 slides
Mpeg 7 slides
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Introduction of firewall slides

  • 1.
  • 2.  Define what is firewall ?  Need of firewall  Types of firewall › Hardware firewall  Advantage and disadvantage › Software firewall  Advantage and disadvantage
  • 3.  Types of firewall techniques › Packet filter  Drawback of packet filtering › Application gateway  advantage › Circuit-level gateway › Bastion host  What a personal firewall can do  What a personal firewall can not do  Manufacturing companies
  • 4.  Firewall is device that provides secure connectivity between networks(internal/external).
  • 5.  A firewall may be a hardware, software of a combination of both that is used to prevent unauthorized program or internet users from accessing a private network or a single computer.  All message entering or leaving the intranet pass through the firewall, which examines each message & blocks those that do not meet the specified security criteria.
  • 6.  To protect confidential information from those who do not explicitly need to access it.  To protect our network & its resources from malicious users & accidents that originate outside of our network.
  • 7.  Hardware firewall  Software firewall
  • 8.  It is a physical device.  It can be installed between the modem and computer.  It can be incorporated into a broadband router being used to share the internet connection.
  • 9.  Protect an entire network.  Usually more expensive, header to configure  E.g.- Cisco pix, netscreen, watchfuard etc.
  • 10.  Uses very little system resources.  More secure  Enhanced security control  Dedicated hardware firewalls are typically more reliable  Easy to disable or remove  Work independently of associated computer system.
  • 11.  Install process is more demanding both physically and mentally.  Takes up physical work space  More expensive  Harder to upgrade and repair
  • 12.  It is a software application.  It is installed onto the computer system that you wish to protect .
  • 13.  Protect a single computer  This is usually the computer with modem attached to it.  Usually less expensive, easier to configure  E.g.- Norton internet security, MacAfee internet security etc.
  • 14.  Considerably cheaper or even free.  Simple to install and upgrade  Requires no physical changes to hardware or network  Ideal for home/family use  Takes up no physical space.
  • 15.  Software may crash or be incompatible with system  Can be difficult to completely disable & especially remove  Software bugs may compromise security  Can be resource hungry  Incompatibilities with OS.
  • 16.  Packet filter  Application gateway/proxy server/proxy application gateway  Circuit-level gateway  Bastion host
  • 17.  It looks at each packet entering or leaving the network accepts or rejects it based on user-defined rules. Applications Presentations Sessions Transport Data Link Physical Data Link Physical Router Applications Presentations Sessions Transport Data Link Physical Network Network
  • 18.  Packet filtering is fairly effective & transparent to users, but it is difficult to configure.  In addition, it is susceptible to IP spoofing.
  • 19.  Drawback of packet filtering technique:- i. Packet filtering rules can be complex. ii. Logging facility is not provided by such firewall. iii. If TCP/IP packet filtering is not implemented fully, it can lead to security hole. iv. Cannot handle RPC (remote produce calls)
  • 20.  In such type of firewall remote host or network can interact only with proxy server, proxy server is responsible for hiding the details of the internal network i.e. intranet.  Users uses TCP/IP application, such as FTP & Telnet servers.
  • 21. Applications Presentations Sessions Transport Data Link Physical Network Data Link Physical Applications Presentations Sessions Transport Data Link Physical Application Gateway Applications Presentations Sessions Transport Network Network Telnet HTTPFTP
  • 22.  This is very effective, but can impose a performance degradation.
  • 23.  Advantages of application gateway:- i. Less complex filter rules ii. Cost effectiveness iii. Robust authentication & logging facility iv. Proxy authenticates only those services for v. Which it is configured/installed.
  • 24.  It is a stand alone application.  It does not permit end-to-end TCP connection. it sets up 2 TCP connection:- • Between itself and a TCP user on an inner host. • Between itself and a TCP user on an outer host.
  • 25.  Bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks.
  • 26.  It generally hosts a single application, provides platform for application gateway and circuit-level gateway.  It supports limited/specific applications to reduce the threat to the computer.  Include application-Telnet, SMTP, FTP
  • 27.  Stop hackers from accessing your computer.  Protect your personal information.  Blocks “pop up” ads and certain cookies.  Determines which programs can access the internet.  Block invalid packets.
  • 28.  Cannot prevent e-mail viruses -only an antivirus product with update definitions can prevent e-mail viruses.  After setting it initially, you cannot forget about it -The firewall will require periodic updates to the rule sets and the software itself.
  • 29.  Cisco system, Inc.  Nortel networks corporation  Juniper networks, Inc.  MacAfee, Inc.  3com corporation  Citrix systems, Inc