SlideShare ist ein Scribd-Unternehmen logo
1 von 19
FIREWALLS
E-Commerce
BBA 6th Semester,
Prime College
Hem Sagar Pokhrel
Faculty Member, Computer Science & IT department
Prime College, Kathmandu
geeksagar@prime.edu.np
9843410129
Firewall Design Principles
The firewall is inserted between the premises
network and the Internet
Aims:
 Establish a controlled link
 Protect the premises network from Internet-based
attacks
2
Firewall Characteristics
• Design goals:
• All traffic from inside to outside must pass through
the firewall (physically blocking all access to the
local network except via the firewall)
• Only authorized traffic (defined by the local
security police) will be allowed to pass.
• The firewall itself is immune to penetration (use of
trusted system with a secure operating system)
3
Firewall Characteristics
 Four general techniques:
1. Service control
 Determines the types of Internet services that can be
accessed, inbound or outbound
2. Direction control
 Determines the direction in which particular service requests
are allowed to flow
4
Firewall Characteristics
3. User control
 Controls access to a service according to which user
is attempting to access it
4. Behavior control
 Controls how particular services are used (e.g. filter
e-mail)
5
Types of Firewalls
Three common types of Firewalls:
1. Packet-filtering routers
2. Application-level gateways
3. Circuit-level gateways
 (Bastion host)
6
Types of Firewalls
Packet-filtering Router
Applies a set of rules to each incoming IP packet
and then forwards or discards the packet
Filter packets going in both directions
The packet filter is typically set up as a list of
rules based on matches to fields in the IP or TCP
header
Two default policies (discard or forward)
7
Types of Firewalls
 Packet-filtering Router
8
Types of Firewalls
Advantages:
 Simplicity
 Transparency to users
 High speed
Disadvantages:
 Difficulty of setting up packet filter rules
 Lack of Authentication
9
Types of Firewalls
Possible attacks and appropriate countermeasures
 IP address spoofing
 Source routing attacks
 Tiny fragment attacks
10
Types of Firewalls
Application-level Gateway
 Also known as application proxy or application-level proxy, an
application gateway is an application program that runs on a
firewall system between two networks.
 When a client program establishes a connection to
a destination service, it connects to an application gateway,
or proxy.
 The client then negotiates with the proxy server in order to
communicate with the destination service.
11
Application-level Gateway
 In effect, the proxy establishes the connection with the
destination behind the firewall and acts on behalf of the client,
hiding and protecting individual computers on the network
behind the firewall.
 This creates two connections: one between the client and the
proxy server and one between the proxy server and the
destination.
 Once connected, the proxy makes all packet-forwarding
decisions.
 Since all communication is conducted through the proxy server,
computers behind the firewall are protected.
12
Types of Firewalls
Application-level Gateway
13
Application-level Gateway
Advantages:
 Higher security than packet filters
 Only need to scrutinize a few allowable applications
 Easy to log and audit all incoming traffic
Disadvantages:
 Additional processing overhead on each connection
(gateway as splice point)
14
Types of Firewalls
Circuit-level Gateway
Stand-alone system or
Specialized function performed by an Application-level
Gateway
Sets up two TCP connections
The gateway typically relays TCP segments from one
connection to the other without examining the contents
15
Circuit-level Gateway
 The security function consists of determining which connections will be
allowed
 Typically use is a situation in which the system administrator trusts the
internal users
 Circuit-level gateways work at the session layer of the OSI model, or as a
"shim-layer" between the application layer and the transport layer of
the TCP/IP stack.
 They monitor TCP handshaking between packets to determine whether a
requested session is legitimate.
 Information passed to a remote computer through a circuit-level gateway
appears to have originated from the gateway.
16
Circuit-level Gateway
 Firewall technology supervises TCP handshaking among packets to
confirm a session is genuine.
 Firewall traffic is clean based on particular session rules and may
be controlled to acknowledged computers only.
 But circuit-level firewalls do not clean entity packets. This is useful
for hiding information about protected networks.
 Circuit-level gateways are relatively inexpensive and have the
advantage of hiding information about the private network they
protect. On the other hand, they do not filter individual packets
17
Types of Firewalls
Circuit-level Gateway
18
Types of Firewalls
Bastion Host
A system identified by the firewall administrator as a
critical strong point in the network´s security
The bastion host serves as a platform for an application-
level or circuit-level gateway
19

Weitere ähnliche Inhalte

Was ist angesagt?

FireWall
FireWallFireWall
FireWall
rubal_9
 

Was ist angesagt? (20)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
Firewall Firewall
Firewall
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Dmz
Dmz Dmz
Dmz
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
FireWall
FireWallFireWall
FireWall
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Firewall
FirewallFirewall
Firewall
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 

Ähnlich wie Firewall and It's Types

what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
ezoicxcom
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
haq107457
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
vinay arora
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
gocokir267
 
Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
AschalewAyele2
 

Ähnlich wie Firewall and It's Types (20)

Firewall
FirewallFirewall
Firewall
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
Firewall
FirewallFirewall
Firewall
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
Firewall
FirewallFirewall
Firewall
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptx
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Chapter_Five Compueter secuityryhf S.pdf
Chapter_Five Compueter secuityryhf   S.pdfChapter_Five Compueter secuityryhf   S.pdf
Chapter_Five Compueter secuityryhf S.pdf
 

Mehr von Hem Pokhrel

Mehr von Hem Pokhrel (20)

Software/System Development Life Cycle
Software/System Development Life CycleSoftware/System Development Life Cycle
Software/System Development Life Cycle
 
Network Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part INetwork Infrastructure for E-commerce | Part I
Network Infrastructure for E-commerce | Part I
 
PrestaShop Kathmandu Ecommerce Meetup #2
PrestaShop Kathmandu Ecommerce Meetup #2PrestaShop Kathmandu Ecommerce Meetup #2
PrestaShop Kathmandu Ecommerce Meetup #2
 
Marketing Information System (MkIS)
Marketing Information System (MkIS)Marketing Information System (MkIS)
Marketing Information System (MkIS)
 
Primary Memory: RAM, ROM and their Types
Primary Memory: RAM, ROM and their TypesPrimary Memory: RAM, ROM and their Types
Primary Memory: RAM, ROM and their Types
 
OUTPUT DEVICES: MONITORS (CRT, LCD, LED, PLASMA)
OUTPUT DEVICES: MONITORS (CRT, LCD, LED, PLASMA)OUTPUT DEVICES: MONITORS (CRT, LCD, LED, PLASMA)
OUTPUT DEVICES: MONITORS (CRT, LCD, LED, PLASMA)
 
Introduction to Bus | Address, Data, Control Bus
Introduction to Bus | Address, Data, Control BusIntroduction to Bus | Address, Data, Control Bus
Introduction to Bus | Address, Data, Control Bus
 
Touch Screens and Scanner
Touch Screens and ScannerTouch Screens and Scanner
Touch Screens and Scanner
 
BBA First Semester | Course introduction
BBA First Semester | Course introductionBBA First Semester | Course introduction
BBA First Semester | Course introduction
 
Software Agents & Their Taxonomy | Ecommerce BBA Handout
Software Agents & Their Taxonomy | Ecommerce BBA HandoutSoftware Agents & Their Taxonomy | Ecommerce BBA Handout
Software Agents & Their Taxonomy | Ecommerce BBA Handout
 
How to be THIN and SKINNY - 5 Simple Tips
How to be THIN and SKINNY - 5 Simple TipsHow to be THIN and SKINNY - 5 Simple Tips
How to be THIN and SKINNY - 5 Simple Tips
 
BBA 6th Orientation
BBA 6th OrientationBBA 6th Orientation
BBA 6th Orientation
 
Computer Network | BBA First Semester
Computer Network | BBA First SemesterComputer Network | BBA First Semester
Computer Network | BBA First Semester
 
Short Questions Collections | BBA First Semester
Short Questions Collections | BBA First SemesterShort Questions Collections | BBA First Semester
Short Questions Collections | BBA First Semester
 
Detailed format for E-commerce project report |BBA
Detailed format for E-commerce project report |BBADetailed format for E-commerce project report |BBA
Detailed format for E-commerce project report |BBA
 
PrestaShop - Kathmandu Ecommerce Meetup #1
PrestaShop - Kathmandu Ecommerce Meetup #1PrestaShop - Kathmandu Ecommerce Meetup #1
PrestaShop - Kathmandu Ecommerce Meetup #1
 
E-environment
E-environmentE-environment
E-environment
 
Electronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-CommerceElectronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-Commerce
 
Internet Marketing Basics | E-Commerce
Internet Marketing Basics | E-CommerceInternet Marketing Basics | E-Commerce
Internet Marketing Basics | E-Commerce
 
Computer History, Generations, Types and IO
Computer History, Generations, Types and IOComputer History, Generations, Types and IO
Computer History, Generations, Types and IO
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Kürzlich hochgeladen (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Firewall and It's Types

  • 1. FIREWALLS E-Commerce BBA 6th Semester, Prime College Hem Sagar Pokhrel Faculty Member, Computer Science & IT department Prime College, Kathmandu geeksagar@prime.edu.np 9843410129
  • 2. Firewall Design Principles The firewall is inserted between the premises network and the Internet Aims:  Establish a controlled link  Protect the premises network from Internet-based attacks 2
  • 3. Firewall Characteristics • Design goals: • All traffic from inside to outside must pass through the firewall (physically blocking all access to the local network except via the firewall) • Only authorized traffic (defined by the local security police) will be allowed to pass. • The firewall itself is immune to penetration (use of trusted system with a secure operating system) 3
  • 4. Firewall Characteristics  Four general techniques: 1. Service control  Determines the types of Internet services that can be accessed, inbound or outbound 2. Direction control  Determines the direction in which particular service requests are allowed to flow 4
  • 5. Firewall Characteristics 3. User control  Controls access to a service according to which user is attempting to access it 4. Behavior control  Controls how particular services are used (e.g. filter e-mail) 5
  • 6. Types of Firewalls Three common types of Firewalls: 1. Packet-filtering routers 2. Application-level gateways 3. Circuit-level gateways  (Bastion host) 6
  • 7. Types of Firewalls Packet-filtering Router Applies a set of rules to each incoming IP packet and then forwards or discards the packet Filter packets going in both directions The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header Two default policies (discard or forward) 7
  • 8. Types of Firewalls  Packet-filtering Router 8
  • 9. Types of Firewalls Advantages:  Simplicity  Transparency to users  High speed Disadvantages:  Difficulty of setting up packet filter rules  Lack of Authentication 9
  • 10. Types of Firewalls Possible attacks and appropriate countermeasures  IP address spoofing  Source routing attacks  Tiny fragment attacks 10
  • 11. Types of Firewalls Application-level Gateway  Also known as application proxy or application-level proxy, an application gateway is an application program that runs on a firewall system between two networks.  When a client program establishes a connection to a destination service, it connects to an application gateway, or proxy.  The client then negotiates with the proxy server in order to communicate with the destination service. 11
  • 12. Application-level Gateway  In effect, the proxy establishes the connection with the destination behind the firewall and acts on behalf of the client, hiding and protecting individual computers on the network behind the firewall.  This creates two connections: one between the client and the proxy server and one between the proxy server and the destination.  Once connected, the proxy makes all packet-forwarding decisions.  Since all communication is conducted through the proxy server, computers behind the firewall are protected. 12
  • 14. Application-level Gateway Advantages:  Higher security than packet filters  Only need to scrutinize a few allowable applications  Easy to log and audit all incoming traffic Disadvantages:  Additional processing overhead on each connection (gateway as splice point) 14
  • 15. Types of Firewalls Circuit-level Gateway Stand-alone system or Specialized function performed by an Application-level Gateway Sets up two TCP connections The gateway typically relays TCP segments from one connection to the other without examining the contents 15
  • 16. Circuit-level Gateway  The security function consists of determining which connections will be allowed  Typically use is a situation in which the system administrator trusts the internal users  Circuit-level gateways work at the session layer of the OSI model, or as a "shim-layer" between the application layer and the transport layer of the TCP/IP stack.  They monitor TCP handshaking between packets to determine whether a requested session is legitimate.  Information passed to a remote computer through a circuit-level gateway appears to have originated from the gateway. 16
  • 17. Circuit-level Gateway  Firewall technology supervises TCP handshaking among packets to confirm a session is genuine.  Firewall traffic is clean based on particular session rules and may be controlled to acknowledged computers only.  But circuit-level firewalls do not clean entity packets. This is useful for hiding information about protected networks.  Circuit-level gateways are relatively inexpensive and have the advantage of hiding information about the private network they protect. On the other hand, they do not filter individual packets 17
  • 19. Types of Firewalls Bastion Host A system identified by the firewall administrator as a critical strong point in the network´s security The bastion host serves as a platform for an application- level or circuit-level gateway 19

Hinweis der Redaktion

  1. IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a forged source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system. Source routing is a method that can be used to specify the route that a packet should take through the network. In source routing the path through the network is set by the source or a device that tells the network source the desired path.