SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Fire walls
Most organizations today have an internal network that interconnects their 
computer systems. But, the Internet is inherently an insecure network. An 
Internet connection effectively extends the enterprise network to include all 
30,000+ other Internet-connected networks. This breaches the physical 
security perimeter between the enterprise network and the outside world.
A firewall is a secure Internet gateway that is used to 
interconnect a private network to the Internet. 
There are a number of components that make up a firewall : 
 The Internet access security policy of the organization. 
 The security policy is independent of technology and techniques. 
 The mapping of the security policy onto technical designs and 
procedures. 
 The firewall system, which is the hardware and software which 
implements the firewall.
ISO uses a 7 layer model for Open Systems Interconnection, whereas 
the Internet can be regarded as having a 5 layer model. 
Whereabouts in these models are firewall systems placed ?
Packet filtering routers were the first type of firewall to be invented. A 
packet filtering router should be able to filter IP packets based on the 
following four fields: 
 source IP address 
 destination IP address 
 TCP/UDP source port 
 TCP/UDP destination port 
Filtering is used to: 
 block connections from specific hosts or networks 
 block connections to specific hosts or networks 
 block connections to specific ports 
 block connections from specific ports
This is a software module that runs in the operating system of a 
Windows or Unix PC firewall, and inspects the packets that are 
arriving. The inspection is driven by security rules configured into the 
machine by the security officer. Headers from all seven layers of the 
ISO model are inspected, and information about the packets is fed into 
dynamic state tables that store information about the connection.
An application level firewall is created by installing a (bastion) host 
computer running the appropriate application(s), between the packet 
filtering router and the intranet. 
 FTP : 
poses a security threat because confidential information may be 
exported from the organization. 
 TELNET: 
Allows users to login to remote machines. 
 HTTP : 
Accesses remote web pages.
With content filtering, the application data is handed over to a 
content filtering server that unpacks the data to see what is inside, and 
harmful content is then disposed. 
Authentication: 
It has already been noted that simple passwords can not be relied 
upon to provide authentication information over the Internet. 
TYPES: 
1. SOCKS Authentication 
2. RADIUS 
3. Hardware Based One Time Passwords
SOCKS provide an authentication layer for the firewall that can be 
used by all application proxis. Calls come into the SOCKS service, are 
authenticated by it, then a call is opened up to the application proxy which 
does further application level filtering before making a call to the 
application on the intranet. 
2.RADIUS: 
The Remote Authentication Dial In User Service (RADIUS). The mode 
of operation is as follows: 
1. The user dials into the network via a modem. 
2. The receiving computer acts as a RADIUS client, and will usually 
ask the user for username and password. 
3. The RADIUS client sends an Access Request message to the 
RADIUS server including the username and password.
An increasingly common authentication method is the use of 
one-time passwords. 
There are two popular variants of one-time passwords. One is 
based on a challenge response mechanism, the other on synchronized 
clocks.
The Dual Homed Gateway: 
This is a secure firewall design comprising an application 
gateway and a packet filtering router. It is called “dual homed”. 
The Screened Host Gateway: 
The screened host gateway is similar to the above, but more 
flexible and less secure, since trusted traffic may pass directly from the 
Internet into the private network, thereby bypassing the application gateway. 
The Screened Subnet Gateway: 
This configuration creates a small isolated network between the 
Internet and the corporate network, which is sometimes referred to as the 
demilitarized zone (DMZ). 
Double Proxying and a DMZ: 
It is more secure that the screened subnet seen in the previous 
section. It is used by a bank to protect its internal network from direct access 
from the Internet.
The concepts which we have provided prove 
the versatile nature of firewall and provide apprehensive idea of 
choosing the suitable configuration.
Firewalls

Weitere ähnliche Inhalte

Was ist angesagt?

Data Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed FirewallData Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed Firewall
Manish Kumar
 
Firewals in Network Security NS10
Firewals in Network Security NS10Firewals in Network Security NS10
Firewals in Network Security NS10
koolkampus
 

Was ist angesagt? (20)

Firewall
FirewallFirewall
Firewall
 
Data Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed FirewallData Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devices
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 
Firewals in Network Security NS10
Firewals in Network Security NS10Firewals in Network Security NS10
Firewals in Network Security NS10
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Network security
 Network security Network security
Network security
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 

Ähnlich wie Firewalls

Ähnlich wie Firewalls (20)

Network security
Network securityNetwork security
Network security
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Ch20 book
Ch20 bookCh20 book
Ch20 book
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 
Network security
Network securityNetwork security
Network security
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
ANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdfANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdf
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Firewall
FirewallFirewall
Firewall
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Firewall
FirewallFirewall
Firewall
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 

Mehr von Deevena Dayaal

Mehr von Deevena Dayaal (20)

Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Wimax
WimaxWimax
Wimax
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Smart dust
Smart dustSmart dust
Smart dust
 
Sixth sense
Sixth senseSixth sense
Sixth sense
 
Satellite phones
Satellite phonesSatellite phones
Satellite phones
 
Rolltops
RolltopsRolltops
Rolltops
 
Redtacton
RedtactonRedtacton
Redtacton
 
Windows8
Windows8Windows8
Windows8
 
Nokia morph
Nokia morphNokia morph
Nokia morph
 
Mind reading computer
Mind reading computerMind reading computer
Mind reading computer
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
 
Haptics
HapticsHaptics
Haptics
 
Dna computing
Dna computingDna computing
Dna computing
 
Halographic data storage
Halographic data storageHalographic data storage
Halographic data storage
 
Gsm network
Gsm networkGsm network
Gsm network
 
Globus toolkit in grid
Globus toolkit in gridGlobus toolkit in grid
Globus toolkit in grid
 
Gi fi technology
Gi fi technologyGi fi technology
Gi fi technology
 
Fuel cells
Fuel cellsFuel cells
Fuel cells
 
Firefox smart phone os
Firefox smart phone osFirefox smart phone os
Firefox smart phone os
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Firewalls

  • 2. Most organizations today have an internal network that interconnects their computer systems. But, the Internet is inherently an insecure network. An Internet connection effectively extends the enterprise network to include all 30,000+ other Internet-connected networks. This breaches the physical security perimeter between the enterprise network and the outside world.
  • 3. A firewall is a secure Internet gateway that is used to interconnect a private network to the Internet. There are a number of components that make up a firewall :  The Internet access security policy of the organization.  The security policy is independent of technology and techniques.  The mapping of the security policy onto technical designs and procedures.  The firewall system, which is the hardware and software which implements the firewall.
  • 4. ISO uses a 7 layer model for Open Systems Interconnection, whereas the Internet can be regarded as having a 5 layer model. Whereabouts in these models are firewall systems placed ?
  • 5. Packet filtering routers were the first type of firewall to be invented. A packet filtering router should be able to filter IP packets based on the following four fields:  source IP address  destination IP address  TCP/UDP source port  TCP/UDP destination port Filtering is used to:  block connections from specific hosts or networks  block connections to specific hosts or networks  block connections to specific ports  block connections from specific ports
  • 6. This is a software module that runs in the operating system of a Windows or Unix PC firewall, and inspects the packets that are arriving. The inspection is driven by security rules configured into the machine by the security officer. Headers from all seven layers of the ISO model are inspected, and information about the packets is fed into dynamic state tables that store information about the connection.
  • 7. An application level firewall is created by installing a (bastion) host computer running the appropriate application(s), between the packet filtering router and the intranet.  FTP : poses a security threat because confidential information may be exported from the organization.  TELNET: Allows users to login to remote machines.  HTTP : Accesses remote web pages.
  • 8. With content filtering, the application data is handed over to a content filtering server that unpacks the data to see what is inside, and harmful content is then disposed. Authentication: It has already been noted that simple passwords can not be relied upon to provide authentication information over the Internet. TYPES: 1. SOCKS Authentication 2. RADIUS 3. Hardware Based One Time Passwords
  • 9. SOCKS provide an authentication layer for the firewall that can be used by all application proxis. Calls come into the SOCKS service, are authenticated by it, then a call is opened up to the application proxy which does further application level filtering before making a call to the application on the intranet. 2.RADIUS: The Remote Authentication Dial In User Service (RADIUS). The mode of operation is as follows: 1. The user dials into the network via a modem. 2. The receiving computer acts as a RADIUS client, and will usually ask the user for username and password. 3. The RADIUS client sends an Access Request message to the RADIUS server including the username and password.
  • 10.
  • 11. An increasingly common authentication method is the use of one-time passwords. There are two popular variants of one-time passwords. One is based on a challenge response mechanism, the other on synchronized clocks.
  • 12. The Dual Homed Gateway: This is a secure firewall design comprising an application gateway and a packet filtering router. It is called “dual homed”. The Screened Host Gateway: The screened host gateway is similar to the above, but more flexible and less secure, since trusted traffic may pass directly from the Internet into the private network, thereby bypassing the application gateway. The Screened Subnet Gateway: This configuration creates a small isolated network between the Internet and the corporate network, which is sometimes referred to as the demilitarized zone (DMZ). Double Proxying and a DMZ: It is more secure that the screened subnet seen in the previous section. It is used by a bank to protect its internal network from direct access from the Internet.
  • 13. The concepts which we have provided prove the versatile nature of firewall and provide apprehensive idea of choosing the suitable configuration.