SlideShare ist ein Scribd-Unternehmen logo
1 von 19
PRESENTERS :-
VARUN SACHDEVA
ABHISHEK
KHYATI MATHUR
PRABHDEEP KAUR
Presentation :’Firewalls’
1
Introduction
 FireWall is device that provides secure connectivity between
networks..
 A firewall may be a hardware, software, or a combination of
both that is used to prevent unauthorized programs or Internet
users from accessing a private network and/or a single computer.
2
Hardware vs. Software Firewalls
3
 Hardware Firewalls
 Protect an entire network
 Implemented on the router level
 Usually more expensive, harder to configure
 Software Firewalls
 Protect a single computer
 Usually less expensive, easier to configure
How does a software firewall work?
4
 Inspects each individual “packet” of data as it arrives at either
side of the firewall
 Determines whether it should be allowed to pass through or if it
should be blocked
Types of Firewalls
 Common types of Firewalls:
1. Packet-filtering routers
2. Application-level gateways1
3. Circuit-level gateways1
5
6
◦ Packet-filtering Router
• Applies a set of rules to each incoming IP packet
and then forwards or discards the packet
◦ Filter packets going in both directions
◦ The packet filter is typically set up as a list of
rules based on matches to fields in the IP or TCP
header
◦ Two default policies (discard or forward)
7
Packet Filtering Firewall
Trusted
Network
Firewall
rule set
Packet is Blocked or Discarded
Untrusted
Network
8
Packet Filtering Firewall
A packet filtering firewall is often called a network layer firewall
because the filtering is primarily done at the network layer (layer
three) or the transport layer (layer four) of the OSI reference
model.
9
 Application-level Gateway
 Gateway sits between user on inside and server on outside. Instead of
talking directly, user and server talk through proxy.
 Allows more fine grained and sophisticated control than packet
filtering. For example, ftp server may not allow files greater than a set
size.
 A mail server is an example of an application gateway
◦ Can’t deposit mail in recipient’s mail server without passing through
sender’s mail server
host-to-gateway
ftp session
gateway-to-remote
host ftp session
application
gateway
10
Application Gateways/Proxies
11
Circuit-level Gateway
1. Stand-alone system
2. Specialized function performed by an Application-level Gateway
3. Sets up two TCP connections
4. The security function consists of determining which connections
will be allowed
5. Typically use is a situation in which the system administrator
trusts the internal users
12
Circuit-level Gateway
Firewall Rules
13
 Allow – traffic that flows automatically because it has been
deemed
 Block – traffic that is blocked because it has been deemed
dangerous to your computer
 Ask – asks the user whether or not the traffic is allowed to pass
through
Making The Firewall Fit
 IP address
 Domain names
 Protocols
14
What It Protects You From
 Remote login
 Simple Mail Transfer Protocol session hijacking
 Operating system bugs
 Spam
15
16
Conclusion
17
What a personal firewall can do ?
• Stop hackers from accessing your computer.
• Protects your personal information.
• Blocks “pop up” ads and certain cookies.
• Determines which programs can access the Internet.
• Block invalid packets.
18
• What a personal firewall cannot do ?
• Cannot prevent e-mail
viruses
– Only an antivirus product
with updated definitions can
prevent e-mail viruses.
• After setting it initially, you cannot forget about it
– The firewall will require periodic updates to the rulesets
and the software itself.
19
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1sweta dargad
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolIssar Kapadia
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilitiesG Prachi
 
The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls david rom
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection toolsvishalgohel12195
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Radhika Talaviya
 
Types of firewall
Types of firewallTypes of firewall
Types of firewallPina Parmar
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsüremin_oz
 

Was ist angesagt? (20)

Firewall
FirewallFirewall
Firewall
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall
FirewallFirewall
Firewall
 
Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
 
Firewall & its Services
Firewall & its ServicesFirewall & its Services
Firewall & its Services
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
 
The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Wiretapping
WiretappingWiretapping
Wiretapping
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Topic22
Topic22Topic22
Topic22
 
Firewall
FirewallFirewall
Firewall
 

Andere mochten auch

Providing incentives
Providing incentivesProviding incentives
Providing incentivesJoseph Grabel
 
сокальщина гра
сокальщина грасокальщина гра
сокальщина граOlgaVladychko
 
Omnichannel cases
Omnichannel casesOmnichannel cases
Omnichannel casesTESC-MBA
 
2015 опис досвіду обдаровані блог
2015 опис досвіду обдаровані  блог2015 опис досвіду обдаровані  блог
2015 опис досвіду обдаровані блогOlgaVladychko
 
Ua sl take-home exam-s2-akk-ikm-2015
Ua sl take-home exam-s2-akk-ikm-2015Ua sl take-home exam-s2-akk-ikm-2015
Ua sl take-home exam-s2-akk-ikm-2015M.Taufiq B
 

Andere mochten auch (20)

Ijtra130512
Ijtra130512Ijtra130512
Ijtra130512
 
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATIONA SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
 
UNIVERSIDAD METROPOLITANA
UNIVERSIDAD METROPOLITANAUNIVERSIDAD METROPOLITANA
UNIVERSIDAD METROPOLITANA
 
Odes-i
Odes-iOdes-i
Odes-i
 
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
 
1413315061 chapter7
1413315061 chapter71413315061 chapter7
1413315061 chapter7
 
Transcript
TranscriptTranscript
Transcript
 
CARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PASCARP: AN IMAGE BASED SECURITY USING I-PAS
CARP: AN IMAGE BASED SECURITY USING I-PAS
 
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
 
презентация 4
презентация 4презентация 4
презентация 4
 
Providing incentives
Providing incentivesProviding incentives
Providing incentives
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
INVESTMENT AND ECONOMIC GROWTH IN SUDAN: AN EMPIRICAL INVESTIGATION, 1999-2011
INVESTMENT AND ECONOMIC GROWTH IN SUDAN: AN EMPIRICAL INVESTIGATION, 1999-2011INVESTMENT AND ECONOMIC GROWTH IN SUDAN: AN EMPIRICAL INVESTIGATION, 1999-2011
INVESTMENT AND ECONOMIC GROWTH IN SUDAN: AN EMPIRICAL INVESTIGATION, 1999-2011
 
http://ijtra.com/view/role-of-power-electronics-in-non-renewable-and-renewabl...
http://ijtra.com/view/role-of-power-electronics-in-non-renewable-and-renewabl...http://ijtra.com/view/role-of-power-electronics-in-non-renewable-and-renewabl...
http://ijtra.com/view/role-of-power-electronics-in-non-renewable-and-renewabl...
 
сокальщина гра
сокальщина грасокальщина гра
сокальщина гра
 
DEVELOPMENT OF A SOFTWARE MAINTENANCE COST ESTIMATION MODEL: 4 TH GL PERSPECTIVE
DEVELOPMENT OF A SOFTWARE MAINTENANCE COST ESTIMATION MODEL: 4 TH GL PERSPECTIVEDEVELOPMENT OF A SOFTWARE MAINTENANCE COST ESTIMATION MODEL: 4 TH GL PERSPECTIVE
DEVELOPMENT OF A SOFTWARE MAINTENANCE COST ESTIMATION MODEL: 4 TH GL PERSPECTIVE
 
Omnichannel cases
Omnichannel casesOmnichannel cases
Omnichannel cases
 
A COMPOSITION ON SOFTWARE TESTING
A COMPOSITION ON SOFTWARE TESTINGA COMPOSITION ON SOFTWARE TESTING
A COMPOSITION ON SOFTWARE TESTING
 
2015 опис досвіду обдаровані блог
2015 опис досвіду обдаровані  блог2015 опис досвіду обдаровані  блог
2015 опис досвіду обдаровані блог
 
Ua sl take-home exam-s2-akk-ikm-2015
Ua sl take-home exam-s2-akk-ikm-2015Ua sl take-home exam-s2-akk-ikm-2015
Ua sl take-home exam-s2-akk-ikm-2015
 

Ähnlich wie Firewallpresentation 100826052003-phpapp02(1)

Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02shivendra pratap singh
 
Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02devidas shinde
 
firewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxfirewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxApdiazizHussein
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].pptBachaSirata
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewallsDivya Jyoti
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfDr. Shivashankar
 
Unit II Chapter 6 firewalls.ppt
Unit II Chapter 6 firewalls.pptUnit II Chapter 6 firewalls.ppt
Unit II Chapter 6 firewalls.pptAkshitRana31
 

Ähnlich wie Firewallpresentation 100826052003-phpapp02(1) (20)

Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02
 
Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02
 
firewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxfirewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptx
 
Linta
LintaLinta
Linta
 
Firewall
FirewallFirewall
Firewall
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Firewalls-Intro
Firewalls-IntroFirewalls-Intro
Firewalls-Intro
 
Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
Unit II Chapter 6 firewalls.ppt
Unit II Chapter 6 firewalls.pptUnit II Chapter 6 firewalls.ppt
Unit II Chapter 6 firewalls.ppt
 
Firewall
FirewallFirewall
Firewall
 

Kürzlich hochgeladen

Kwin - Trang Tải App Game Kwin68 Club Chính Thức
Kwin - Trang Tải App Game Kwin68 Club Chính ThứcKwin - Trang Tải App Game Kwin68 Club Chính Thức
Kwin - Trang Tải App Game Kwin68 Club Chính ThứcKwin68 Club
 
RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作f3774p8b
 
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作ss846v0c
 
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...Amil baba
 
澳洲Deakin学位证,迪肯大学毕业证书1:1制作
澳洲Deakin学位证,迪肯大学毕业证书1:1制作澳洲Deakin学位证,迪肯大学毕业证书1:1制作
澳洲Deakin学位证,迪肯大学毕业证书1:1制作rpb5qxou
 
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls DubaiDubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubaikojalkojal131
 
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjekAIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjekpavan402055
 
Computer Organization and Architecture 10th - William Stallings, Ch01.pdf
Computer Organization and Architecture 10th - William Stallings, Ch01.pdfComputer Organization and Architecture 10th - William Stallings, Ch01.pdf
Computer Organization and Architecture 10th - William Stallings, Ch01.pdfShahdAbdElsamea2
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...Amil Baba Dawood bangali
 

Kürzlich hochgeladen (9)

Kwin - Trang Tải App Game Kwin68 Club Chính Thức
Kwin - Trang Tải App Game Kwin68 Club Chính ThứcKwin - Trang Tải App Game Kwin68 Club Chính Thức
Kwin - Trang Tải App Game Kwin68 Club Chính Thức
 
RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作
 
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
 
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
 
澳洲Deakin学位证,迪肯大学毕业证书1:1制作
澳洲Deakin学位证,迪肯大学毕业证书1:1制作澳洲Deakin学位证,迪肯大学毕业证书1:1制作
澳洲Deakin学位证,迪肯大学毕业证书1:1制作
 
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls DubaiDubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
 
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjekAIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
 
Computer Organization and Architecture 10th - William Stallings, Ch01.pdf
Computer Organization and Architecture 10th - William Stallings, Ch01.pdfComputer Organization and Architecture 10th - William Stallings, Ch01.pdf
Computer Organization and Architecture 10th - William Stallings, Ch01.pdf
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
 

Firewallpresentation 100826052003-phpapp02(1)

  • 1. PRESENTERS :- VARUN SACHDEVA ABHISHEK KHYATI MATHUR PRABHDEEP KAUR Presentation :’Firewalls’ 1
  • 2. Introduction  FireWall is device that provides secure connectivity between networks..  A firewall may be a hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. 2
  • 3. Hardware vs. Software Firewalls 3  Hardware Firewalls  Protect an entire network  Implemented on the router level  Usually more expensive, harder to configure  Software Firewalls  Protect a single computer  Usually less expensive, easier to configure
  • 4. How does a software firewall work? 4  Inspects each individual “packet” of data as it arrives at either side of the firewall  Determines whether it should be allowed to pass through or if it should be blocked
  • 5. Types of Firewalls  Common types of Firewalls: 1. Packet-filtering routers 2. Application-level gateways1 3. Circuit-level gateways1 5
  • 6. 6 ◦ Packet-filtering Router • Applies a set of rules to each incoming IP packet and then forwards or discards the packet ◦ Filter packets going in both directions ◦ The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header ◦ Two default policies (discard or forward)
  • 7. 7 Packet Filtering Firewall Trusted Network Firewall rule set Packet is Blocked or Discarded Untrusted Network
  • 8. 8 Packet Filtering Firewall A packet filtering firewall is often called a network layer firewall because the filtering is primarily done at the network layer (layer three) or the transport layer (layer four) of the OSI reference model.
  • 9. 9  Application-level Gateway  Gateway sits between user on inside and server on outside. Instead of talking directly, user and server talk through proxy.  Allows more fine grained and sophisticated control than packet filtering. For example, ftp server may not allow files greater than a set size.  A mail server is an example of an application gateway ◦ Can’t deposit mail in recipient’s mail server without passing through sender’s mail server host-to-gateway ftp session gateway-to-remote host ftp session application gateway
  • 11. 11 Circuit-level Gateway 1. Stand-alone system 2. Specialized function performed by an Application-level Gateway 3. Sets up two TCP connections 4. The security function consists of determining which connections will be allowed 5. Typically use is a situation in which the system administrator trusts the internal users
  • 13. Firewall Rules 13  Allow – traffic that flows automatically because it has been deemed  Block – traffic that is blocked because it has been deemed dangerous to your computer  Ask – asks the user whether or not the traffic is allowed to pass through
  • 14. Making The Firewall Fit  IP address  Domain names  Protocols 14
  • 15. What It Protects You From  Remote login  Simple Mail Transfer Protocol session hijacking  Operating system bugs  Spam 15
  • 17. 17 What a personal firewall can do ? • Stop hackers from accessing your computer. • Protects your personal information. • Blocks “pop up” ads and certain cookies. • Determines which programs can access the Internet. • Block invalid packets.
  • 18. 18 • What a personal firewall cannot do ? • Cannot prevent e-mail viruses – Only an antivirus product with updated definitions can prevent e-mail viruses. • After setting it initially, you cannot forget about it – The firewall will require periodic updates to the rulesets and the software itself.