SlideShare ist ein Scribd-Unternehmen logo
1 von 30
 Define what is firewall ?
 Need of firewall
 Types of firewall
› Hardware firewall
 Advantage and disadvantage
› Software firewall
 Advantage and disadvantage
 Types of firewall techniques
› Packet filter
 Drawback of packet filtering
› Application gateway
 advantage
› Circuit-level gateway
› Bastion host
 What a personal firewall can do
 What a personal firewall can not do
 Manufacturing companies
 Firewall is device that provides secure
connectivity between
networks(internal/external).
 A firewall may be a hardware, software of a
combination of both that is used to prevent
unauthorized program or internet users from
accessing a private network or a single
computer.
 All message entering or leaving the intranet
pass through the firewall, which examines
each message & blocks those that do not
meet the specified security criteria.
 To protect confidential
information from those
who do not explicitly need
to access it.
 To protect our network &
its resources from
malicious users &
accidents that originate
outside of our network.
 Hardware firewall
 Software firewall
 It is a physical device.
 It can be installed
between the modem and
computer.
 It can be incorporated
into a broadband router
being used to share the
internet connection.
 Protect an entire network.
 Usually more expensive, header to configure
 E.g.- Cisco pix, netscreen, watchfuard etc.
 Uses very little system resources.
 More secure
 Enhanced security control
 Dedicated hardware firewalls are typically more
reliable
 Easy to disable or remove
 Work independently of associated computer
system.
 Install process is more demanding both
physically and mentally.
 Takes up physical work space
 More expensive
 Harder to upgrade and repair
 It is a software
application.
 It is installed onto the
computer system that
you wish to protect .
 Protect a single computer
 This is usually the computer with modem
attached to it.
 Usually less expensive, easier to configure
 E.g.- Norton internet security, MacAfee
internet security etc.
 Considerably cheaper or even free.
 Simple to install and upgrade
 Requires no physical changes to hardware
or network
 Ideal for home/family use
 Takes up no physical space.
 Software may crash or be incompatible with
system
 Can be difficult to completely disable &
especially remove
 Software bugs may compromise security
 Can be resource hungry
 Incompatibilities with OS.
 Packet filter
 Application gateway/proxy server/proxy
application gateway
 Circuit-level gateway
 Bastion host
 It looks at each packet entering or leaving
the network accepts or rejects it based on
user-defined rules.
Applications
Presentations
Sessions
Transport
Data Link
Physical
Data Link
Physical
Router
Applications
Presentations
Sessions
Transport
Data Link
Physical
Network Network
 Packet filtering is fairly effective &
transparent to users, but it is difficult to
configure.
 In addition, it is susceptible to IP spoofing.
 Drawback of packet filtering technique:-
i. Packet filtering rules can be complex.
ii. Logging facility is not provided by such
firewall.
iii. If TCP/IP packet filtering is not implemented
fully, it can lead to security hole.
iv. Cannot handle RPC (remote produce calls)
 In such type of firewall remote host or
network can interact only with proxy server,
proxy server is responsible for hiding the
details of the internal network i.e. intranet.
 Users uses TCP/IP application, such as FTP
& Telnet servers.
Applications
Presentations
Sessions
Transport
Data Link
Physical
Network
Data Link
Physical
Applications
Presentations
Sessions
Transport
Data Link
Physical
Application Gateway
Applications
Presentations
Sessions
Transport
Network Network
Telnet HTTPFTP
 This is very effective, but can impose a
performance degradation.
 Advantages of application gateway:-
i. Less complex filter rules
ii. Cost effectiveness
iii. Robust authentication & logging facility
iv. Proxy authenticates only those services for
v. Which it is configured/installed.
 It is a stand alone application.
 It does not permit end-to-end TCP connection. it
sets up 2 TCP connection:-
• Between itself and a TCP user on an inner host.
• Between itself and a TCP user on an outer host.
 Bastion host is a special purpose computer
on a network specifically designed and
configured to withstand attacks.
 It generally hosts a single application,
provides platform for application gateway
and circuit-level gateway.
 It supports limited/specific applications to
reduce the threat to the computer.
 Include application-Telnet, SMTP, FTP
 Stop hackers from accessing your
computer.
 Protect your personal information.
 Blocks “pop up” ads and certain
cookies.
 Determines which programs can
access the internet.
 Block invalid packets.
 Cannot prevent e-mail
viruses
-only an antivirus product
with update definitions
can prevent e-mail viruses.
 After setting it initially,
you cannot forget about it
-The firewall will require
periodic updates to the rule sets and the software itself.
 Cisco system, Inc.
 Nortel networks corporation
 Juniper networks, Inc.
 MacAfee, Inc.
 3com corporation
 Citrix systems, Inc
Introduction of firewall slides

Weitere ähnliche Inhalte

Was ist angesagt?

FireWall
FireWallFireWall
FireWall
rubal_9
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 

Was ist angesagt? (20)

Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Firewall
FirewallFirewall
Firewall
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
FireWall
FireWallFireWall
FireWall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
Firewall Firewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Firewall
FirewallFirewall
Firewall
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Traditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation FirewallTraditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation Firewall
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 

Ähnlich wie Introduction of firewall slides

Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
mordannon
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
mordannon
 

Ähnlich wie Introduction of firewall slides (20)

INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
Firewall
FirewallFirewall
Firewall
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Day4
Day4Day4
Day4
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Firewall
FirewallFirewall
Firewall
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
 
Kerberos
KerberosKerberos
Kerberos
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
Firewalls
FirewallsFirewalls
Firewalls
 
محمد
محمدمحمد
محمد
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Mehr von rahul kundu (17)

Material management
Material managementMaterial management
Material management
 
Business function in organization
Business function in organizationBusiness function in organization
Business function in organization
 
Document object model(dom)
Document object model(dom)Document object model(dom)
Document object model(dom)
 
Document object model(dom)
Document object model(dom)Document object model(dom)
Document object model(dom)
 
Dhtml
DhtmlDhtml
Dhtml
 
Sgml
SgmlSgml
Sgml
 
Internet
InternetInternet
Internet
 
Type of internet connectivity
Type of internet connectivityType of internet connectivity
Type of internet connectivity
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
 
Electronic payment system(EPS)
Electronic payment system(EPS)Electronic payment system(EPS)
Electronic payment system(EPS)
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
 
Electronic data-interchange slides
Electronic data-interchange slidesElectronic data-interchange slides
Electronic data-interchange slides
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
Virus slides
Virus slidesVirus slides
Virus slides
 
Mpeg 7 slides
Mpeg 7 slides Mpeg 7 slides
Mpeg 7 slides
 

Kürzlich hochgeladen

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Introduction of firewall slides

  • 1.
  • 2.  Define what is firewall ?  Need of firewall  Types of firewall › Hardware firewall  Advantage and disadvantage › Software firewall  Advantage and disadvantage
  • 3.  Types of firewall techniques › Packet filter  Drawback of packet filtering › Application gateway  advantage › Circuit-level gateway › Bastion host  What a personal firewall can do  What a personal firewall can not do  Manufacturing companies
  • 4.  Firewall is device that provides secure connectivity between networks(internal/external).
  • 5.  A firewall may be a hardware, software of a combination of both that is used to prevent unauthorized program or internet users from accessing a private network or a single computer.  All message entering or leaving the intranet pass through the firewall, which examines each message & blocks those that do not meet the specified security criteria.
  • 6.  To protect confidential information from those who do not explicitly need to access it.  To protect our network & its resources from malicious users & accidents that originate outside of our network.
  • 7.  Hardware firewall  Software firewall
  • 8.  It is a physical device.  It can be installed between the modem and computer.  It can be incorporated into a broadband router being used to share the internet connection.
  • 9.  Protect an entire network.  Usually more expensive, header to configure  E.g.- Cisco pix, netscreen, watchfuard etc.
  • 10.  Uses very little system resources.  More secure  Enhanced security control  Dedicated hardware firewalls are typically more reliable  Easy to disable or remove  Work independently of associated computer system.
  • 11.  Install process is more demanding both physically and mentally.  Takes up physical work space  More expensive  Harder to upgrade and repair
  • 12.  It is a software application.  It is installed onto the computer system that you wish to protect .
  • 13.  Protect a single computer  This is usually the computer with modem attached to it.  Usually less expensive, easier to configure  E.g.- Norton internet security, MacAfee internet security etc.
  • 14.  Considerably cheaper or even free.  Simple to install and upgrade  Requires no physical changes to hardware or network  Ideal for home/family use  Takes up no physical space.
  • 15.  Software may crash or be incompatible with system  Can be difficult to completely disable & especially remove  Software bugs may compromise security  Can be resource hungry  Incompatibilities with OS.
  • 16.  Packet filter  Application gateway/proxy server/proxy application gateway  Circuit-level gateway  Bastion host
  • 17.  It looks at each packet entering or leaving the network accepts or rejects it based on user-defined rules. Applications Presentations Sessions Transport Data Link Physical Data Link Physical Router Applications Presentations Sessions Transport Data Link Physical Network Network
  • 18.  Packet filtering is fairly effective & transparent to users, but it is difficult to configure.  In addition, it is susceptible to IP spoofing.
  • 19.  Drawback of packet filtering technique:- i. Packet filtering rules can be complex. ii. Logging facility is not provided by such firewall. iii. If TCP/IP packet filtering is not implemented fully, it can lead to security hole. iv. Cannot handle RPC (remote produce calls)
  • 20.  In such type of firewall remote host or network can interact only with proxy server, proxy server is responsible for hiding the details of the internal network i.e. intranet.  Users uses TCP/IP application, such as FTP & Telnet servers.
  • 21. Applications Presentations Sessions Transport Data Link Physical Network Data Link Physical Applications Presentations Sessions Transport Data Link Physical Application Gateway Applications Presentations Sessions Transport Network Network Telnet HTTPFTP
  • 22.  This is very effective, but can impose a performance degradation.
  • 23.  Advantages of application gateway:- i. Less complex filter rules ii. Cost effectiveness iii. Robust authentication & logging facility iv. Proxy authenticates only those services for v. Which it is configured/installed.
  • 24.  It is a stand alone application.  It does not permit end-to-end TCP connection. it sets up 2 TCP connection:- • Between itself and a TCP user on an inner host. • Between itself and a TCP user on an outer host.
  • 25.  Bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks.
  • 26.  It generally hosts a single application, provides platform for application gateway and circuit-level gateway.  It supports limited/specific applications to reduce the threat to the computer.  Include application-Telnet, SMTP, FTP
  • 27.  Stop hackers from accessing your computer.  Protect your personal information.  Blocks “pop up” ads and certain cookies.  Determines which programs can access the internet.  Block invalid packets.
  • 28.  Cannot prevent e-mail viruses -only an antivirus product with update definitions can prevent e-mail viruses.  After setting it initially, you cannot forget about it -The firewall will require periodic updates to the rule sets and the software itself.
  • 29.  Cisco system, Inc.  Nortel networks corporation  Juniper networks, Inc.  MacAfee, Inc.  3com corporation  Citrix systems, Inc