SlideShare ist ein Scribd-Unternehmen logo
1 von 26
By: Siddhant Shetty(1115101 B2)
& Shivank Shah(1115100 B2)
 The term firewall was in use by Lightoler as early as [1764] to describe
walls which separated the parts of a building most likely to have a fire (e.g.,
a kitchen)from the rest of a structure. These physical barriers prevented or
slowed a fire's spread throughout a building, saving both lives and
property.
 A firewall is simply a program or hardware device that filters the
information coming through the Internet connection into your
private network or computer system.
 IP addresses - Each machine on the Internet is assigned a unique address called an IP
address. IP addresses are 32-bit numbers, normally expressed as four "octets" in a "dotted
decimal number." A typical IP address looks like this: 216.27.61.137
 Domain names - Because it is hard to remember the string of numbers that make up an
IP address, and because IP addresses sometimes need to change, all servers on the Internet
also have human-readable names, called domain names A company might block all access
to certain domain names, or allow access only to specific domain names.
 Ports - Any server machine makes its services available to the Internet using numbered
ports, one for each service that is available on the server .For example, if a server machine
is running a Web (HTTP) server and an FTP server, the Web server would typically be
available on port 80, and the FTP server would be available on port 21. A company might
block port 21 access on all machines but one inside the company.
 Packet : On the Internet, the network breaks an e-mail message into parts of a certain size
in bytes. These are the packets. Each packet carries the information that will help it get to
its destination -- the sender's IP address, the intended receiver's IP address, something that
tells the network how many packets this e-mail message has been broken into and the
number of this particular packet. The packets carry the data in the protocols that the
Internet uses: Transmission Control Protocol/Internet Protocol (TCP/IP). Each packet
contains part of the body of your message. A typical packet contains perhaps 1,000 or
1,500 bytes.
 Protocols - The protocol is the pre-defined way that someone who wants to use a
service talks with that service. The "someone" could be a person, but more often it
is a computer program like a Web browser. Protocols are often text, and simply
describe how the client and server will have their conversation. The http in the
Web's protocol. Some common protocols that you can set firewall filters for
include:
 IP (Internet Protocol) - the main delivery system for information over the Internet
 TCP (Transmission Control Protocol) - used to break apart and rebuild information
that travels over the Internet
 HTTP (Hyper Text Transfer Protocol) - used for Web pages
 FTP (File Transfer Protocol) - used to download and upload files
 UDP (User Datagram Protocol) - used for information that requires no response,
such as streaming audio and video
 ICMP (Internet Control Message Protocol) - used by a router to exchange the
information with other routers
 SMTP (Simple Mail Transport Protocol) - used to send text-based information (e-
mail)
 SNMP (Simple Network Management Protocol) - used to collect system information
from a remote computer
 Telnet - used to perform commands on a remote computer
 The OSI Reference Model is a set of seven layers that define the different stages
that data must go through to travel from one device to another over a network.
 A protocol stack is a group of protocols that all work together to allow software or
hardware to perform a function. The TCP/IP protocol stack is a good example. It
uses four layers that map to the OSI model as follows:
 Firewalls use one of the following methods to control traffic flowing in and out of the
network:
 Packet filtering - Packets (small chunks of data) are analyzed against a set of filters.
Packets that make it through the filters are sent to the requesting system and all others
are discarded.
 Packet filters use one or more of the following pieces of information to make their
decision on whether or not to forward the packet [Reed 2002a]:
 source address
 destination address
 whether the packet is inbound or outbound
 Advantages of Packet Filtering :
 Packet filtering is "free." If you already have a router, it
probably supports packet filtering. On a small LAN a
single router can be sufficient for use as a packet filter.
 Theoretically, you only need one, at the point where your
LAN connects to the Internet or an external network.
This provides a "choke point" for the network.
 You don't have to train users or use any special client or
server programs to implement packet filters. The
screening router or packet filtering host transparently
does all the work to the clients in your network.
Disadvantages of Packet Filtering Firewall :
 Difficulty of setting up packet filtering rules
 Another drawback of packet filtering is that it cannot determine which user is causing
which network traffic. It can inspect the IP address of the host where the traffic
originates, but a host is not the same as a user. If an organization with a packet-
filtering firewall is trying to limit the services some users can access, it must either
implement an additional, separate protocol for authentication or use the IP address of
the user's primary machine as a weak replacement for true user authentication.
 Also, because IP addresses can be spoofed, using them for authentication can lead to
other problems.
 A stateful firewall is a firewall that keeps track of the state of network connections
(such as TCP streams, UDP communication) traveling across it.
 The firewall is programmed to distinguish legitimate packets for different types of
connections.
 Only packets matching a known active connection will be allowed by the firewall;
others will be rejected
 Information traveling from inside the firewall to the outside is monitored for specific
defining characteristics, then incoming information is compared to these
characteristics.
 If the comparison yields a reasonable match, the information is allowed through.
Otherwise it is discarded.
 Advantages of stateful inspection :
 More secure .
 No need to write long and insecure filtering rules.
 Mechanism is faster.
 Disadvantages of stateful inspection :
 Cache table overflow: If a firewall of a very large or busy network with less
memory has filled its memory with cache ,it will start evicting cache entries and
the connections will drop.
 Time out too short :If the user has been inactive for a long time ,the cache entry
is evicted and the connection is lost.
 Developed by Cisco, Network Address Translation is used by a device
(firewall, router or computer) that sits between an internal network and the rest of the
world.
 Implementing dynamic NAT automatically creates a firewall between your internal
network and outside networks, or between your internal network and the Internet.
 A computer on an external network cannot connect to your computer unless your
computer has initiated the contact. You can browse the Internet and connect to a site,
and even download a file; but somebody else cannot latch onto your IP address and
use it to connect to a port on your computer.
 Circuit level gateways work at the session layer of the OSI model, or the TCP
layer of TCP/IP.
 They monitor TCP handshaking between packets to determine whether a
requested session is legitimate. Information passed to remote computer
through a circuit level gateway appears to have originated from the gateway.
This is useful for hiding information about protected networks.
 Circuit level gateways are relatively inexpensive and have the advantage of
hiding information about the private network they protect.
 On the other hand, they do not filter individual packets.
 Application level gateways, also called proxies, are similar to circuit-level gateways
except that they are application specific. They can filter packets at the application layer
of the OSI model.
 Incoming or outgoing packets cannot access services for which there is no proxy. In
plain terms ,an application level gateway that is configured to be a web proxy will not
allow any ftp, other traffic through. Because they examine packets at application layer,
they can filter application specific commands such as http:post and get, etc.
 They offer a high level of security, but have a significant impact on network
performance. This is because of context switches that slow down network access
dramatically.
 They are not transparent to end users and require manual configuration of each client
computer.
Great Firewall of China
 The Golden Shield Project is a censorship and surveillance
 project operated by the Ministry of Public Security(MPS)
division of the government of China. The project was initiated
in 1998 and began operations in November 2003.
 It has been nicknamed "the Great Firewall" in reference to its
role as a network firewall and to the ancient Great Wall of
China.
 A major part of the project includes the ability to block content
by preventing IP addresses from being routed through and
consists of standard firewalls and proxy servers.
 Web sites belonging to "outlawed" or suppressed groups, such
as pro-democracy activists.
 News sources that often cover topics that are considered
defamatory against China, such as police brutality, freedom of
speech, democracy, and Marxist sites. These sites
include Voice of America and the Chinese edition of BBC
News.
 Most blogging sites like Twitter experience frequent or
permanent outages.
 Web sites that contain anything the Chinese authorities regard
as obscenity or pornography.
 Web sites relating to criminal activity.
 Sites linked with the Dalai Lama, his teachings or
the International Tibet Independence Movement.
 Social networking sites like Facebook are also blocked.
 The English-language BBC website (but not the Chinese
language website).
 YouTube, although it has been subsequently re-blocked.
 Wikipedia (wikipedia.org), HTTPS version is not blocked.
However, if one uses HTTP, many wikis are blocked.
 Social websites and free web hosting websites. However, these
have also been re-blocked.
 Some foreign news websites.
 Dropbox has been unblocked, although the reason for this is
still unclear
 Despite strict government regulations, the Chinese people are
continuing to protest against their government’s attempt to censor
the Internet.
 They can also utilize the widely available proxies and virtual private
networks to fanqiang, or "climb the wall.”
 In January 2010,Google announced that it will no longer censor its
Web search results in China, even if this means it might have to
shut down its Chinese operations altogether which ultimately led to
the blocking of all google search sites.
 Denial of service:
In feb 2000 many websites such as Yahoo,Amazon,CNN etc were attacked and were shut
down for hours .Yahoo lost a million $ /minute
 Viruses:
Malicious program inserted in an executable file .When executed spreads and infects other
files.The effects include inability to boot,deletion of file,inability to create file etc .
 Trojan Horse:
Creates backdoor which gives the hacker access to private and confidential information. Eg:
black orifice,freelink,back door g etc.
 Worm:
On May 4,2000 a fast moving computer worm called “lovebug” spread by email to millions
of computers and deleted every .jpeg and .mp3 file on computer.
 Macro Virus:Infects word or excel documents and is spread by email attachment.
 Remote login by Hackers.
 E-mail bomb
 Provide
◦ configurable packet filtering
◦ NAT/DHCP
Eg :
 Linksys – single board RISC based linux computer
 D-Link
 http://scan.sygatetech.com/
 http://www.csnc.ch/onlinetests/
 http://grc.com/
 http://hackerwhacker.com/
 A firewall cannot prevent users or attackers with modems from dialing in to or out of
the internal network, thus bypassing the firewall and its protection completely.
 Firewalls cannot stop internal users from accessing websites with malicious code,
making user education critical.
 Firewalls cannot protect you when your security policy is too lax.
 Email viruses :
 Email viruses are attached to email messages. A firewall can't determine the contents
of email messages, so it can't protect you from these types of viruses. You should use
an antivirus program to scan and delete suspicious attachments from an email message
before you open it. Even when you have an antivirus program, you should not open
an email attachment if you're not positive it's safe.
 Phishing scams :
 Phishing is a technique used to trick computer users into revealing personal or
financial information, such as a bank account password. A common online phishing
scam starts with an email message that appears to come from a trusted source, but
actually directs recipients to provide information to a fraudulent website. Firewalls
can't determine the contents of email messages, so they can't protect you from this
type of attack.
 Discuss the role of firewall ? Explain in detail
firewall components and list the benefits of
an internet firewall (10 mks)
 www.howstuffworks.com
 www.wikipedia.org
 P.T joseph
 www.youtube.com
 www.campuskeeda.com
 www.antionline.com
 www.microsoft.com/security/pc-security/firewalls-whatis.aspx
 www.vicomsoft.com/learning-center/firewalls/
 www.cisco.com

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Https
HttpsHttps
Https
 
Firewalls
FirewallsFirewalls
Firewalls
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 
Firewall
FirewallFirewall
Firewall
 
Web Security
Web SecurityWeb Security
Web Security
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Firewall
FirewallFirewall
Firewall
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Unit 4
Unit 4Unit 4
Unit 4
 
SSL
SSLSSL
SSL
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 

Andere mochten auch

Firewall
FirewallFirewall
FirewallApo
 
China Online Media and the Great Firewall
China Online Media and the Great FirewallChina Online Media and the Great Firewall
China Online Media and the Great FirewallAndrea Hunt
 
Social Media: Hype, Hell or Hope
Social Media: Hype, Hell or HopeSocial Media: Hype, Hell or Hope
Social Media: Hype, Hell or HopeRick Mans
 
China - Human Rights Revision
China - Human Rights RevisionChina - Human Rights Revision
China - Human Rights Revisionknoxmodernstudies
 
6 trends of China social media and consumer insights
6 trends of China social media and consumer insights 6 trends of China social media and consumer insights
6 trends of China social media and consumer insights Vincent lee
 
Navigating the Social Media Landscape In China
Navigating the Social Media Landscape In ChinaNavigating the Social Media Landscape In China
Navigating the Social Media Landscape In ChinaGravity Media
 
The Social Media Landscape in China
The Social Media Landscape in ChinaThe Social Media Landscape in China
The Social Media Landscape in ChinaAshley McVey
 
China, human rights and international relations 1
China, human rights and international relations 1China, human rights and international relations 1
China, human rights and international relations 1shivraj negi
 
American Meridian University Quality Tool Series: The Fish Bone
American Meridian University Quality Tool Series: The Fish Bone American Meridian University Quality Tool Series: The Fish Bone
American Meridian University Quality Tool Series: The Fish Bone College/University
 
Diclofenac rabeprazole hplc
Diclofenac rabeprazole hplcDiclofenac rabeprazole hplc
Diclofenac rabeprazole hplcDeepak Gadade
 
Tropicana's product (re)design
Tropicana's product (re)designTropicana's product (re)design
Tropicana's product (re)designbhushan8233
 
Quality Management
Quality ManagementQuality Management
Quality ManagementShivank Shah
 
Digital, Mobile, and Social Media in China (April 2011)
Digital, Mobile, and Social Media in China (April 2011)Digital, Mobile, and Social Media in China (April 2011)
Digital, Mobile, and Social Media in China (April 2011)Simon Kemp
 
Evolution Of Convergence And Voip
Evolution Of Convergence And VoipEvolution Of Convergence And Voip
Evolution Of Convergence And VoipUtkarsh Verma
 
Travelling salesman problem using genetic algorithms
Travelling salesman problem using genetic algorithms Travelling salesman problem using genetic algorithms
Travelling salesman problem using genetic algorithms Shivank Shah
 

Andere mochten auch (20)

Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
China Online Media and the Great Firewall
China Online Media and the Great FirewallChina Online Media and the Great Firewall
China Online Media and the Great Firewall
 
Social Media: Hype, Hell or Hope
Social Media: Hype, Hell or HopeSocial Media: Hype, Hell or Hope
Social Media: Hype, Hell or Hope
 
China - Human Rights Revision
China - Human Rights RevisionChina - Human Rights Revision
China - Human Rights Revision
 
6 trends of China social media and consumer insights
6 trends of China social media and consumer insights 6 trends of China social media and consumer insights
6 trends of China social media and consumer insights
 
Navigating the Social Media Landscape In China
Navigating the Social Media Landscape In ChinaNavigating the Social Media Landscape In China
Navigating the Social Media Landscape In China
 
Firewall
FirewallFirewall
Firewall
 
The Social Media Landscape in China
The Social Media Landscape in ChinaThe Social Media Landscape in China
The Social Media Landscape in China
 
China, human rights and international relations 1
China, human rights and international relations 1China, human rights and international relations 1
China, human rights and international relations 1
 
Ciw-tencent-empire
Ciw-tencent-empireCiw-tencent-empire
Ciw-tencent-empire
 
American Meridian University Quality Tool Series: The Fish Bone
American Meridian University Quality Tool Series: The Fish Bone American Meridian University Quality Tool Series: The Fish Bone
American Meridian University Quality Tool Series: The Fish Bone
 
Diclofenac rabeprazole hplc
Diclofenac rabeprazole hplcDiclofenac rabeprazole hplc
Diclofenac rabeprazole hplc
 
Tropicana's product (re)design
Tropicana's product (re)designTropicana's product (re)design
Tropicana's product (re)design
 
Quality Management
Quality ManagementQuality Management
Quality Management
 
Digital, Mobile, and Social Media in China (April 2011)
Digital, Mobile, and Social Media in China (April 2011)Digital, Mobile, and Social Media in China (April 2011)
Digital, Mobile, and Social Media in China (April 2011)
 
Evolution Of Convergence And Voip
Evolution Of Convergence And VoipEvolution Of Convergence And Voip
Evolution Of Convergence And Voip
 
Bajaj Auto
Bajaj AutoBajaj Auto
Bajaj Auto
 
Work sampling
Work samplingWork sampling
Work sampling
 
Travelling salesman problem using genetic algorithms
Travelling salesman problem using genetic algorithms Travelling salesman problem using genetic algorithms
Travelling salesman problem using genetic algorithms
 

Ähnlich wie Firewall

Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security conceptssonuagain
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptxCSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptxVivekTripathi684438
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix FirewallSouvik Santra
 
Internetbasics
InternetbasicsInternetbasics
Internetbasicspatinijava
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XIIDeepak Singh
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet BawaPuneet Bawa
 
Network Project Report
Network Project ReportNetwork Project Report
Network Project ReportTiffany Graham
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentalsThe Avi Sharma
 
Network Security
Network SecurityNetwork Security
Network SecurityJaya sudha
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Servervinay arora
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basicsRaj Alam
 

Ähnlich wie Firewall (20)

Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptxCSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
 
Mcse question
Mcse questionMcse question
Mcse question
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
Firewall
FirewallFirewall
Firewall
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Network Project Report
Network Project ReportNetwork Project Report
Network Project Report
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Firewall
FirewallFirewall
Firewall
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Network Security
Network SecurityNetwork Security
Network Security
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 

Kürzlich hochgeladen

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Kürzlich hochgeladen (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Firewall

  • 1. By: Siddhant Shetty(1115101 B2) & Shivank Shah(1115100 B2)
  • 2.  The term firewall was in use by Lightoler as early as [1764] to describe walls which separated the parts of a building most likely to have a fire (e.g., a kitchen)from the rest of a structure. These physical barriers prevented or slowed a fire's spread throughout a building, saving both lives and property.  A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system.
  • 3.  IP addresses - Each machine on the Internet is assigned a unique address called an IP address. IP addresses are 32-bit numbers, normally expressed as four "octets" in a "dotted decimal number." A typical IP address looks like this: 216.27.61.137  Domain names - Because it is hard to remember the string of numbers that make up an IP address, and because IP addresses sometimes need to change, all servers on the Internet also have human-readable names, called domain names A company might block all access to certain domain names, or allow access only to specific domain names.  Ports - Any server machine makes its services available to the Internet using numbered ports, one for each service that is available on the server .For example, if a server machine is running a Web (HTTP) server and an FTP server, the Web server would typically be available on port 80, and the FTP server would be available on port 21. A company might block port 21 access on all machines but one inside the company.  Packet : On the Internet, the network breaks an e-mail message into parts of a certain size in bytes. These are the packets. Each packet carries the information that will help it get to its destination -- the sender's IP address, the intended receiver's IP address, something that tells the network how many packets this e-mail message has been broken into and the number of this particular packet. The packets carry the data in the protocols that the Internet uses: Transmission Control Protocol/Internet Protocol (TCP/IP). Each packet contains part of the body of your message. A typical packet contains perhaps 1,000 or 1,500 bytes.
  • 4.  Protocols - The protocol is the pre-defined way that someone who wants to use a service talks with that service. The "someone" could be a person, but more often it is a computer program like a Web browser. Protocols are often text, and simply describe how the client and server will have their conversation. The http in the Web's protocol. Some common protocols that you can set firewall filters for include:  IP (Internet Protocol) - the main delivery system for information over the Internet  TCP (Transmission Control Protocol) - used to break apart and rebuild information that travels over the Internet  HTTP (Hyper Text Transfer Protocol) - used for Web pages  FTP (File Transfer Protocol) - used to download and upload files  UDP (User Datagram Protocol) - used for information that requires no response, such as streaming audio and video  ICMP (Internet Control Message Protocol) - used by a router to exchange the information with other routers  SMTP (Simple Mail Transport Protocol) - used to send text-based information (e- mail)  SNMP (Simple Network Management Protocol) - used to collect system information from a remote computer  Telnet - used to perform commands on a remote computer
  • 5.  The OSI Reference Model is a set of seven layers that define the different stages that data must go through to travel from one device to another over a network.  A protocol stack is a group of protocols that all work together to allow software or hardware to perform a function. The TCP/IP protocol stack is a good example. It uses four layers that map to the OSI model as follows:
  • 6.  Firewalls use one of the following methods to control traffic flowing in and out of the network:  Packet filtering - Packets (small chunks of data) are analyzed against a set of filters. Packets that make it through the filters are sent to the requesting system and all others are discarded.  Packet filters use one or more of the following pieces of information to make their decision on whether or not to forward the packet [Reed 2002a]:  source address  destination address  whether the packet is inbound or outbound
  • 7.  Advantages of Packet Filtering :  Packet filtering is "free." If you already have a router, it probably supports packet filtering. On a small LAN a single router can be sufficient for use as a packet filter.  Theoretically, you only need one, at the point where your LAN connects to the Internet or an external network. This provides a "choke point" for the network.  You don't have to train users or use any special client or server programs to implement packet filters. The screening router or packet filtering host transparently does all the work to the clients in your network.
  • 8. Disadvantages of Packet Filtering Firewall :  Difficulty of setting up packet filtering rules  Another drawback of packet filtering is that it cannot determine which user is causing which network traffic. It can inspect the IP address of the host where the traffic originates, but a host is not the same as a user. If an organization with a packet- filtering firewall is trying to limit the services some users can access, it must either implement an additional, separate protocol for authentication or use the IP address of the user's primary machine as a weak replacement for true user authentication.  Also, because IP addresses can be spoofed, using them for authentication can lead to other problems.
  • 9.  A stateful firewall is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it.  The firewall is programmed to distinguish legitimate packets for different types of connections.  Only packets matching a known active connection will be allowed by the firewall; others will be rejected  Information traveling from inside the firewall to the outside is monitored for specific defining characteristics, then incoming information is compared to these characteristics.  If the comparison yields a reasonable match, the information is allowed through. Otherwise it is discarded.
  • 10.  Advantages of stateful inspection :  More secure .  No need to write long and insecure filtering rules.  Mechanism is faster.  Disadvantages of stateful inspection :  Cache table overflow: If a firewall of a very large or busy network with less memory has filled its memory with cache ,it will start evicting cache entries and the connections will drop.  Time out too short :If the user has been inactive for a long time ,the cache entry is evicted and the connection is lost.
  • 11.  Developed by Cisco, Network Address Translation is used by a device (firewall, router or computer) that sits between an internal network and the rest of the world.  Implementing dynamic NAT automatically creates a firewall between your internal network and outside networks, or between your internal network and the Internet.  A computer on an external network cannot connect to your computer unless your computer has initiated the contact. You can browse the Internet and connect to a site, and even download a file; but somebody else cannot latch onto your IP address and use it to connect to a port on your computer.
  • 12.  Circuit level gateways work at the session layer of the OSI model, or the TCP layer of TCP/IP.  They monitor TCP handshaking between packets to determine whether a requested session is legitimate. Information passed to remote computer through a circuit level gateway appears to have originated from the gateway. This is useful for hiding information about protected networks.  Circuit level gateways are relatively inexpensive and have the advantage of hiding information about the private network they protect.  On the other hand, they do not filter individual packets.
  • 13.  Application level gateways, also called proxies, are similar to circuit-level gateways except that they are application specific. They can filter packets at the application layer of the OSI model.  Incoming or outgoing packets cannot access services for which there is no proxy. In plain terms ,an application level gateway that is configured to be a web proxy will not allow any ftp, other traffic through. Because they examine packets at application layer, they can filter application specific commands such as http:post and get, etc.  They offer a high level of security, but have a significant impact on network performance. This is because of context switches that slow down network access dramatically.  They are not transparent to end users and require manual configuration of each client computer.
  • 15.  The Golden Shield Project is a censorship and surveillance  project operated by the Ministry of Public Security(MPS) division of the government of China. The project was initiated in 1998 and began operations in November 2003.  It has been nicknamed "the Great Firewall" in reference to its role as a network firewall and to the ancient Great Wall of China.  A major part of the project includes the ability to block content by preventing IP addresses from being routed through and consists of standard firewalls and proxy servers.
  • 16.  Web sites belonging to "outlawed" or suppressed groups, such as pro-democracy activists.  News sources that often cover topics that are considered defamatory against China, such as police brutality, freedom of speech, democracy, and Marxist sites. These sites include Voice of America and the Chinese edition of BBC News.  Most blogging sites like Twitter experience frequent or permanent outages.
  • 17.  Web sites that contain anything the Chinese authorities regard as obscenity or pornography.  Web sites relating to criminal activity.  Sites linked with the Dalai Lama, his teachings or the International Tibet Independence Movement.  Social networking sites like Facebook are also blocked.
  • 18.  The English-language BBC website (but not the Chinese language website).  YouTube, although it has been subsequently re-blocked.  Wikipedia (wikipedia.org), HTTPS version is not blocked. However, if one uses HTTP, many wikis are blocked.  Social websites and free web hosting websites. However, these have also been re-blocked.  Some foreign news websites.  Dropbox has been unblocked, although the reason for this is still unclear
  • 19.  Despite strict government regulations, the Chinese people are continuing to protest against their government’s attempt to censor the Internet.  They can also utilize the widely available proxies and virtual private networks to fanqiang, or "climb the wall.”  In January 2010,Google announced that it will no longer censor its Web search results in China, even if this means it might have to shut down its Chinese operations altogether which ultimately led to the blocking of all google search sites.
  • 20.  Denial of service: In feb 2000 many websites such as Yahoo,Amazon,CNN etc were attacked and were shut down for hours .Yahoo lost a million $ /minute  Viruses: Malicious program inserted in an executable file .When executed spreads and infects other files.The effects include inability to boot,deletion of file,inability to create file etc .  Trojan Horse: Creates backdoor which gives the hacker access to private and confidential information. Eg: black orifice,freelink,back door g etc.  Worm: On May 4,2000 a fast moving computer worm called “lovebug” spread by email to millions of computers and deleted every .jpeg and .mp3 file on computer.  Macro Virus:Infects word or excel documents and is spread by email attachment.  Remote login by Hackers.  E-mail bomb
  • 21.
  • 22.  Provide ◦ configurable packet filtering ◦ NAT/DHCP Eg :  Linksys – single board RISC based linux computer  D-Link
  • 23.  http://scan.sygatetech.com/  http://www.csnc.ch/onlinetests/  http://grc.com/  http://hackerwhacker.com/
  • 24.  A firewall cannot prevent users or attackers with modems from dialing in to or out of the internal network, thus bypassing the firewall and its protection completely.  Firewalls cannot stop internal users from accessing websites with malicious code, making user education critical.  Firewalls cannot protect you when your security policy is too lax.  Email viruses :  Email viruses are attached to email messages. A firewall can't determine the contents of email messages, so it can't protect you from these types of viruses. You should use an antivirus program to scan and delete suspicious attachments from an email message before you open it. Even when you have an antivirus program, you should not open an email attachment if you're not positive it's safe.  Phishing scams :  Phishing is a technique used to trick computer users into revealing personal or financial information, such as a bank account password. A common online phishing scam starts with an email message that appears to come from a trusted source, but actually directs recipients to provide information to a fraudulent website. Firewalls can't determine the contents of email messages, so they can't protect you from this type of attack.
  • 25.  Discuss the role of firewall ? Explain in detail firewall components and list the benefits of an internet firewall (10 mks)
  • 26.  www.howstuffworks.com  www.wikipedia.org  P.T joseph  www.youtube.com  www.campuskeeda.com  www.antionline.com  www.microsoft.com/security/pc-security/firewalls-whatis.aspx  www.vicomsoft.com/learning-center/firewalls/  www.cisco.com