SlideShare a Scribd company logo
1 of 19
Presentation :’Firewalls’ Presenters :-Gagandeep Singh KarandeepVohra Puneetpal Singh 1
Table of Contents 2 Introduction HOW FIREWALL WORKS Types of Firewalls  MAKING THE FIREWALL FIT TESTING A FIREWALL CONFIGURATION CONCLUSION REFERENCES
Introduction Is hardware, software, or a combination of both used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. 3
Hardware vs. Software Firewalls 4 Hardware Firewalls Protect an entire network Implemented on the router level Usually more expensive, harder to configure Software Firewalls Protect a single computer Usually less expensive, easier to configure
How does a software firewall work? 5 Inspects each individual “packet” of data as it arrives at either side of the firewall Determines whether it should be allowed to pass through or if it should be blocked
Firewall Rules 6 Allow – traffic that flows automatically because it has been deemed Block – traffic that is blocked because it has been deemed dangerous to your computer Ask – asks the user whether or not the traffic is allowed to pass through
What Can a Firewall Do? Focus for security decisions Stop hackers from accessing your computer Can enforce security policy Protects your personal information Limits your exposure Blocks “pop up” ads and certain cookies Can log Internet activity efficiently Determines which programs can access the Internet 7
What Can't a Firewall Do? Can't protect you against malicious insiders Can't protect you against connections that don't go through it Can't protect against completely new threats Can't protect against viruses 8
Types of Firewalls  Packet Filtering Firewall Application level Gateway Circuit level gateway 9
Architectures for Firewall  Single-Box Architecture 10
Screened Host Architecture 11
Making The Firewall Fit IP address Domain names Protocols Ports 12
What It Protects You From Remote login  SMTP session hijacking  Operating system bugs  Spam E-mail bombs  Source routing  13
Security Strategies implemented  Default Deny Prohibit all communication that is not expressly permitted Default Permit Permit all communication that is not explicitly prohibited Least Privilege reduces the authorization level at which various actions are performed Defense in Depth security approach whereby each system on the network is secured to the greatest possible degree Choke Point forces  attackers to use a narrow channel to bypass the network 14
Testing a Firewall Configuration 15 ,[object Object],   implementation ,[object Object]
 Suppose our local network is 172.16.1.0
 And we allow only TCP connections ,[object Object]
REFRENCES 17 www.howstuffworks.com   www.securityfocus.com  www.firewall.com
18 Conclusion

More Related Content

What's hot

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

What's hot (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Firewall
Firewall Firewall
Firewall
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Software security
Software securitySoftware security
Software security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 

Viewers also liked

NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
Intruders
IntrudersIntruders
Intruders
techn
 

Viewers also liked (14)

NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Smart irrigation system using Internet Of Things
Smart irrigation system using Internet Of ThingsSmart irrigation system using Internet Of Things
Smart irrigation system using Internet Of Things
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
Intruders
IntrudersIntruders
Intruders
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Cyber law
Cyber lawCyber law
Cyber law
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Firewall
FirewallFirewall
Firewall
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 

Similar to Firewall presentation

Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
Prabhdeep Kaur
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
Pranav Gontalwar
 
Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq Hanaysha
Hanaysha
 

Similar to Firewall presentation (20)

Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02
 
Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02
 
Linta
LintaLinta
Linta
 
Linta
LintaLinta
Linta
 
firewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxfirewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptx
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
 
Firewall
FirewallFirewall
Firewall
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq Hanaysha
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Net Defender
Net DefenderNet Defender
Net Defender
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Network security
Network securityNetwork security
Network security
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 

More from Amandeep Kaur

Video/ Graphics cards
Video/ Graphics  cardsVideo/ Graphics  cards
Video/ Graphics cards
Amandeep Kaur
 
Menu pop up menu mdi form and playing audio in vb
Menu pop up menu mdi form and playing audio in vbMenu pop up menu mdi form and playing audio in vb
Menu pop up menu mdi form and playing audio in vb
Amandeep Kaur
 
Image contro, and format functions in vb
Image contro, and format functions in vbImage contro, and format functions in vb
Image contro, and format functions in vb
Amandeep Kaur
 
Data base connectivity and flex grid in vb
Data base connectivity and flex grid in vbData base connectivity and flex grid in vb
Data base connectivity and flex grid in vb
Amandeep Kaur
 
Toolbar, statusbar, coolbar in vb
Toolbar, statusbar, coolbar in vbToolbar, statusbar, coolbar in vb
Toolbar, statusbar, coolbar in vb
Amandeep Kaur
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
Amandeep Kaur
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
Amandeep Kaur
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
Amandeep Kaur
 
Report on browser war
Report on browser warReport on browser war
Report on browser war
Amandeep Kaur
 
Report of internet connections
Report of internet connectionsReport of internet connections
Report of internet connections
Amandeep Kaur
 

More from Amandeep Kaur (20)

Video/ Graphics cards
Video/ Graphics  cardsVideo/ Graphics  cards
Video/ Graphics cards
 
Menu vb
Menu vbMenu vb
Menu vb
 
Menu pop up menu mdi form and playing audio in vb
Menu pop up menu mdi form and playing audio in vbMenu pop up menu mdi form and playing audio in vb
Menu pop up menu mdi form and playing audio in vb
 
Active x control
Active x controlActive x control
Active x control
 
Image contro, and format functions in vb
Image contro, and format functions in vbImage contro, and format functions in vb
Image contro, and format functions in vb
 
Data base connectivity and flex grid in vb
Data base connectivity and flex grid in vbData base connectivity and flex grid in vb
Data base connectivity and flex grid in vb
 
Toolbar, statusbar, coolbar in vb
Toolbar, statusbar, coolbar in vbToolbar, statusbar, coolbar in vb
Toolbar, statusbar, coolbar in vb
 
Richtextbox
RichtextboxRichtextbox
Richtextbox
 
Treeview listview
Treeview listviewTreeview listview
Treeview listview
 
Progress bar
Progress barProgress bar
Progress bar
 
Filehandling
FilehandlingFilehandling
Filehandling
 
Socket
SocketSocket
Socket
 
Ppt of socket
Ppt of socketPpt of socket
Ppt of socket
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
 
Internet
InternetInternet
Internet
 
Internet working
Internet workingInternet working
Internet working
 
Report on browser war
Report on browser warReport on browser war
Report on browser war
 
Report of internet connections
Report of internet connectionsReport of internet connections
Report of internet connections
 

Firewall presentation

  • 1. Presentation :’Firewalls’ Presenters :-Gagandeep Singh KarandeepVohra Puneetpal Singh 1
  • 2. Table of Contents 2 Introduction HOW FIREWALL WORKS Types of Firewalls MAKING THE FIREWALL FIT TESTING A FIREWALL CONFIGURATION CONCLUSION REFERENCES
  • 3. Introduction Is hardware, software, or a combination of both used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. 3
  • 4. Hardware vs. Software Firewalls 4 Hardware Firewalls Protect an entire network Implemented on the router level Usually more expensive, harder to configure Software Firewalls Protect a single computer Usually less expensive, easier to configure
  • 5. How does a software firewall work? 5 Inspects each individual “packet” of data as it arrives at either side of the firewall Determines whether it should be allowed to pass through or if it should be blocked
  • 6. Firewall Rules 6 Allow – traffic that flows automatically because it has been deemed Block – traffic that is blocked because it has been deemed dangerous to your computer Ask – asks the user whether or not the traffic is allowed to pass through
  • 7. What Can a Firewall Do? Focus for security decisions Stop hackers from accessing your computer Can enforce security policy Protects your personal information Limits your exposure Blocks “pop up” ads and certain cookies Can log Internet activity efficiently Determines which programs can access the Internet 7
  • 8. What Can't a Firewall Do? Can't protect you against malicious insiders Can't protect you against connections that don't go through it Can't protect against completely new threats Can't protect against viruses 8
  • 9. Types of Firewalls Packet Filtering Firewall Application level Gateway Circuit level gateway 9
  • 10. Architectures for Firewall Single-Box Architecture 10
  • 12. Making The Firewall Fit IP address Domain names Protocols Ports 12
  • 13. What It Protects You From Remote login SMTP session hijacking Operating system bugs Spam E-mail bombs Source routing 13
  • 14. Security Strategies implemented Default Deny Prohibit all communication that is not expressly permitted Default Permit Permit all communication that is not explicitly prohibited Least Privilege reduces the authorization level at which various actions are performed Defense in Depth security approach whereby each system on the network is secured to the greatest possible degree Choke Point forces attackers to use a narrow channel to bypass the network 14
  • 15.
  • 16. Suppose our local network is 172.16.1.0
  • 17.
  • 18. REFRENCES 17 www.howstuffworks.com   www.securityfocus.com  www.firewall.com
  • 20. Testing a Firewall Configuration THANKU 19