SlideShare ist ein Scribd-Unternehmen logo
1 von 26
1.GATEWAY
2.FIREWALL
3.BRIDGE AND ACCESS-
POINT
Presented by
MScIT/16/010 Vinay
Vaghamshi
Gateway
 A gateway is a network node connecting two
networks that use different protocols.
 A node on a network that serves as an entrance
to another network.
 In enterprises, The gateway is the computer that
routes the traffic from a workstation to the
outside network that is serving the Web pages.
 In homes, the gateway is the ISP that connects
the user to the internet.
What is gateway?
 Gateway are also known as Protocol Converters and
can operate any network level. The activates of
gateway are more complex than routers or switch as it
works on different protocols.
 Router is also gateway, Since it interprets data from
one network protocols to another
 Combination of networking hardware and software
that connects two similar kinds of networks.
 Popular type of gateways includes:
 E-Mail Gateway
 IBM Host Gateway
 Internet Gateway
 LAN Gateway
A gateway is an internetworking device that is
capable of joining two different protocol based
network.
Functions of gateway
 A Gateway can connect the telephone network
to the Internet.
 A gateway is always associated with Routers, as
it directs the packets to its destination. On other
hand, you can use it as Proxy Server and
Firewall.
Functions of gateway
 Web application firewalls filter traffic to and from
a web server and look at application-layer data
 Cloud storage gateways translate storage
requests with various cloud storage service API
calls
 Cloud bridges connect networks and services
inside a data center to a virtual data center in an
infrastructure as a service environment, or
between IaaS environments
 API, SOA or XML gateways manage traffic flowing
into and out of a service, microservices-oriented
architecture or an XML-based web service.
Definition of firewall
 A firewall is a hardware or software designed to
permit or deny network transmissions based
upon a set of rules and is frequently used to
protect networks from unauthorized access
while permitting legitimate communications to
pass.
Firewalls Can Perform Basic Routing Functions
How does a software firewall
work?
 Inspects each individual “packet” of data as it arrives at
either side of the firewall
 Determines whether it should be allowed to pass
through or if it should be blocked
 Focus for security decisions
 Stop hackers from accessing your computer
 Can enforce security policy
 Protects your personal information
 Limits your exposure
 Blocks “pop up” ads and certain cookies
 Can log Internet activity efficiently
 Determines which programs can access the Internet
Hardware/software firewall
Figure 1: Hardware Firewall.
Hardware firewall providing
protection
to a Local Area Network.
Figure 2: Computer with Firewall
Software.
Computer running firewall software
that provide protection to PC..etc.,
Firewall Rules
 Allow – traffic that flows automatically
because it has been deemed
 Block – traffic that is blocked because it has
been deemed dangerous to your computer
 Ask – asks the user whether or not the traffic
is allowed to pass through
Types of Firewalls
1. Packet Filtering Firewall
 It looks at each packet entering or leaving the
network and accepts or rejects it based on user-
defined rules. Packet filtering is fairly effective and
transparent to users, but it is difficult to configure.
In addition, it is susceptible to IP spoofing.
 Applies a set of rules to each incoming IP packet
and then forwards or discards the packet
 Filter packets going in both directions
 The packet filter is typically set up as a list of rules
based on matches to fields in the IP or TCP
header
 Two default policies (discard or forward)
Packet Filtering
Applications
Presentations
Sessions
Transport
DataLink
Physical
DataLink
Physical
Router
Applications
Presentations
Sessions
Transport
DataLink
Physical
Networ
k
Networ
k
Types of Firewalls
2. Application gateway/ proxy server/ proxy
application gateway
 In such type of firewall remote host or network can
interact only with proxy server, proxy server is
responsible for hiding the details of the internal
network
 i.e. intranet.
 User uses TCP/IP applications, such as FTP and
Telnet servers.
 This is very effective, but can impose a performance
degradation.
Application gateway
Applications
Presentations
Sessions
Transport
Data Link
Physical
Network
Data Link
Physical
Applications
Presentations
Sessions
Transport
Data Link
Physical
Application Gateway
Applications
Presentations
Sessions
Transport
Network Network
Telnet HTTPFTP
Types of Firewalls
3. Circuit level gateway
 It is a stand alone system or application.
 It does not permit end-to-end TCP connection. It sets
up 2 TCP connections:
 B/w itself and a TCP user on an inner host.
 B/w itself and a TCP user on an outer host.
 Specialized function performed by an Application-level
Gateway
 The gateway typically relays TCP segments from one
connection to the other without examining the
contents
Circuit-level gateway
Definition of a Bridge
 A bridge is a connecting device which has it’s own
processor, memory and two NIC cards, to connect
two portions of a network
 Facilitates host to host communication
 Operates at the physical as well as data link layer
 Bridge is to divide a big network in to smaller sub-
networks
How Bridges Work?
 Bridges work at the Media Access Control
Sub-layer of the OSI model
 .
• Routing table is built to record the segment
no. of
address
 .
• If destination address is in the same segment
as the source address, stop transmit
 .
• Otherwise, forward to the other segment
Bridge at the Last two OSI
Layers
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data link layer
Physical layer
Bridge
A
Physical layer
Data link layer
Network layer
Transport layer
Session layer
Presentation layer
Application layer
B
Function of a Bridge
 As a physical layer device it generates the signal it
receives
 As a data link layer device it checks the source and
destination addresses in the frame
 It send data frames only to the concerned destination
 It minimizes unwanted traffic
 It minimizes network congestion
 Error links can be identified and then isolated
 Security features or access control can be added
 It acts as a filter
 It maintains a table that maps addresses to ports
Characteristics of Bridges
 Routing Tables
– Contains one entry per station of network to which bridge
is connected.
– Is used to determine the network of destination station of
a received packet.
 Filtering
– Is used by bridge to allow only those packets destined to
the remote network.
– Packets are filtered with respect to their destination and
multicast addresses.
 Forwarding
– the process of passing a packet from one network to
another.
 Learning Algorithm
– the process by which the bridge learns how to reach
stations on the internetwork.
Types of Bridges
 Transparent Bridge
– Also called learning bridges
– Build a table of MAC addresses as frames arrive
– Ethernet networks use transparent bridge
– Duties of transparent bridge are : Filtering frames,
forwarding and blocking
 Source Routing Bridge
– Used in Token Ring networks
– Each station should determine the route to the
destination when it wants to send a frame and therefore
include the route information in the header of frame.
– Addresses of these bridges are included in the frame.
– Frame contains not only the source and destination
address but also the bridge addresses.
Access-point
Routers versus Bridges
 Addressing
 Routers are explicitly addressed.
 Bridges are not addressed.
 Availability
 Routers can handle failures in links, stations, and other routers.
 Bridges use only source and destination MAC address, which
does not guarantee delivery of frames.
 Message Size
 Routers can perform fragmentation on packets and thus handle
different packet sizes.
 Bridges cannot do fragmentation and should not forward a frame
which is too big for the next LAN.
 Forwarding
 Routers forward a message to a specific destination.
 Bridges forward a message to an outgoing network.
 Priority
 Routers can treat packets according to priorities
 Bridges treat all packets equally.
 Error Rate
 Network layers have error-checking algorithms that
examines each received packet.
 The MAC layer provides a very low undetected bit error
rate.
 Security
 Both bridges and routers provide the ability to put“security
walls” around specific stations.
 Routers generally provide greater security than bridges
 Because
 they can be addressed directly and
 They use additional data for implementing security
Thank
you

Weitere ähnliche Inhalte

Was ist angesagt?

Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networkspavan kumar Thatikonda
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureManoj Kumar
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocolTom Chou
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPTKalpanaC14
 
Transmission media (data communication)
Transmission media (data communication)Transmission media (data communication)
Transmission media (data communication)Pritom Chaki
 
Transmission impairments(presentation)
Transmission impairments(presentation)Transmission impairments(presentation)
Transmission impairments(presentation)Vivek Kumar
 
PPT on Basic of Gateway
PPT on Basic of GatewayPPT on Basic of Gateway
PPT on Basic of GatewayNaveen Karn
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devicesNumaan Tole
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2koolkampus
 
Twisted pair cable
Twisted pair cableTwisted pair cable
Twisted pair cableilakkiya
 

Was ist angesagt? (20)

Networking devices
Networking devicesNetworking devices
Networking devices
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
Transmission media (data communication)
Transmission media (data communication)Transmission media (data communication)
Transmission media (data communication)
 
Transmission impairments(presentation)
Transmission impairments(presentation)Transmission impairments(presentation)
Transmission impairments(presentation)
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Topic Packet switching
Topic Packet switchingTopic Packet switching
Topic Packet switching
 
PPT on Basic of Gateway
PPT on Basic of GatewayPPT on Basic of Gateway
PPT on Basic of Gateway
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 
Security services
Security servicesSecurity services
Security services
 
IEEE 802 standards
IEEE 802 standardsIEEE 802 standards
IEEE 802 standards
 
Conventional Encryption NS2
Conventional Encryption NS2Conventional Encryption NS2
Conventional Encryption NS2
 
Twisted pair cable
Twisted pair cableTwisted pair cable
Twisted pair cable
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Ip address
Ip addressIp address
Ip address
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 

Ähnlich wie Gateway and firewall

Study of Network Devices
Study of Network DevicesStudy of Network Devices
Study of Network DevicesSM. Aurnob
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986sherifmeetme
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copyTonny Michael
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their securitylovizabasharat
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyAvishek Maitra
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013RoHit VashIsht
 
Ccna exploration network fundamentals
Ccna exploration  network fundamentalsCcna exploration  network fundamentals
Ccna exploration network fundamentalsIT Tech
 

Ähnlich wie Gateway and firewall (20)

PT.pptx
PT.pptxPT.pptx
PT.pptx
 
Networkswitch
Networkswitch Networkswitch
Networkswitch
 
Study of Network Devices
Study of Network DevicesStudy of Network Devices
Study of Network Devices
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986
 
III_UNIT.ppt
III_UNIT.pptIII_UNIT.ppt
III_UNIT.ppt
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copy
 
Networks
Networks   Networks
Networks
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
 
four
fourfour
four
 
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their security
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013
 
Ccna exploration network fundamentals
Ccna exploration  network fundamentalsCcna exploration  network fundamentals
Ccna exploration network fundamentals
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 

Kürzlich hochgeladen

Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Kürzlich hochgeladen (20)

Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 

Gateway and firewall

  • 2. Gateway  A gateway is a network node connecting two networks that use different protocols.  A node on a network that serves as an entrance to another network.  In enterprises, The gateway is the computer that routes the traffic from a workstation to the outside network that is serving the Web pages.  In homes, the gateway is the ISP that connects the user to the internet.
  • 3. What is gateway?  Gateway are also known as Protocol Converters and can operate any network level. The activates of gateway are more complex than routers or switch as it works on different protocols.  Router is also gateway, Since it interprets data from one network protocols to another  Combination of networking hardware and software that connects two similar kinds of networks.  Popular type of gateways includes:  E-Mail Gateway  IBM Host Gateway  Internet Gateway  LAN Gateway
  • 4. A gateway is an internetworking device that is capable of joining two different protocol based network.
  • 5. Functions of gateway  A Gateway can connect the telephone network to the Internet.  A gateway is always associated with Routers, as it directs the packets to its destination. On other hand, you can use it as Proxy Server and Firewall.
  • 6. Functions of gateway  Web application firewalls filter traffic to and from a web server and look at application-layer data  Cloud storage gateways translate storage requests with various cloud storage service API calls  Cloud bridges connect networks and services inside a data center to a virtual data center in an infrastructure as a service environment, or between IaaS environments  API, SOA or XML gateways manage traffic flowing into and out of a service, microservices-oriented architecture or an XML-based web service.
  • 7. Definition of firewall  A firewall is a hardware or software designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. Firewalls Can Perform Basic Routing Functions
  • 8. How does a software firewall work?  Inspects each individual “packet” of data as it arrives at either side of the firewall  Determines whether it should be allowed to pass through or if it should be blocked  Focus for security decisions  Stop hackers from accessing your computer  Can enforce security policy  Protects your personal information  Limits your exposure  Blocks “pop up” ads and certain cookies  Can log Internet activity efficiently  Determines which programs can access the Internet
  • 9. Hardware/software firewall Figure 1: Hardware Firewall. Hardware firewall providing protection to a Local Area Network. Figure 2: Computer with Firewall Software. Computer running firewall software that provide protection to PC..etc.,
  • 10. Firewall Rules  Allow – traffic that flows automatically because it has been deemed  Block – traffic that is blocked because it has been deemed dangerous to your computer  Ask – asks the user whether or not the traffic is allowed to pass through
  • 11. Types of Firewalls 1. Packet Filtering Firewall  It looks at each packet entering or leaving the network and accepts or rejects it based on user- defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.  Applies a set of rules to each incoming IP packet and then forwards or discards the packet  Filter packets going in both directions  The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header  Two default policies (discard or forward)
  • 13. Types of Firewalls 2. Application gateway/ proxy server/ proxy application gateway  In such type of firewall remote host or network can interact only with proxy server, proxy server is responsible for hiding the details of the internal network  i.e. intranet.  User uses TCP/IP applications, such as FTP and Telnet servers.  This is very effective, but can impose a performance degradation.
  • 14. Application gateway Applications Presentations Sessions Transport Data Link Physical Network Data Link Physical Applications Presentations Sessions Transport Data Link Physical Application Gateway Applications Presentations Sessions Transport Network Network Telnet HTTPFTP
  • 15. Types of Firewalls 3. Circuit level gateway  It is a stand alone system or application.  It does not permit end-to-end TCP connection. It sets up 2 TCP connections:  B/w itself and a TCP user on an inner host.  B/w itself and a TCP user on an outer host.  Specialized function performed by an Application-level Gateway  The gateway typically relays TCP segments from one connection to the other without examining the contents
  • 17. Definition of a Bridge  A bridge is a connecting device which has it’s own processor, memory and two NIC cards, to connect two portions of a network  Facilitates host to host communication  Operates at the physical as well as data link layer  Bridge is to divide a big network in to smaller sub- networks
  • 18. How Bridges Work?  Bridges work at the Media Access Control Sub-layer of the OSI model  . • Routing table is built to record the segment no. of address  . • If destination address is in the same segment as the source address, stop transmit  . • Otherwise, forward to the other segment
  • 19. Bridge at the Last two OSI Layers Application layer Presentation layer Session layer Transport layer Network layer Data link layer Physical layer Bridge A Physical layer Data link layer Network layer Transport layer Session layer Presentation layer Application layer B
  • 20. Function of a Bridge  As a physical layer device it generates the signal it receives  As a data link layer device it checks the source and destination addresses in the frame  It send data frames only to the concerned destination  It minimizes unwanted traffic  It minimizes network congestion  Error links can be identified and then isolated  Security features or access control can be added  It acts as a filter  It maintains a table that maps addresses to ports
  • 21. Characteristics of Bridges  Routing Tables – Contains one entry per station of network to which bridge is connected. – Is used to determine the network of destination station of a received packet.  Filtering – Is used by bridge to allow only those packets destined to the remote network. – Packets are filtered with respect to their destination and multicast addresses.  Forwarding – the process of passing a packet from one network to another.  Learning Algorithm – the process by which the bridge learns how to reach stations on the internetwork.
  • 22. Types of Bridges  Transparent Bridge – Also called learning bridges – Build a table of MAC addresses as frames arrive – Ethernet networks use transparent bridge – Duties of transparent bridge are : Filtering frames, forwarding and blocking  Source Routing Bridge – Used in Token Ring networks – Each station should determine the route to the destination when it wants to send a frame and therefore include the route information in the header of frame. – Addresses of these bridges are included in the frame. – Frame contains not only the source and destination address but also the bridge addresses.
  • 24. Routers versus Bridges  Addressing  Routers are explicitly addressed.  Bridges are not addressed.  Availability  Routers can handle failures in links, stations, and other routers.  Bridges use only source and destination MAC address, which does not guarantee delivery of frames.  Message Size  Routers can perform fragmentation on packets and thus handle different packet sizes.  Bridges cannot do fragmentation and should not forward a frame which is too big for the next LAN.  Forwarding  Routers forward a message to a specific destination.  Bridges forward a message to an outgoing network.
  • 25.  Priority  Routers can treat packets according to priorities  Bridges treat all packets equally.  Error Rate  Network layers have error-checking algorithms that examines each received packet.  The MAC layer provides a very low undetected bit error rate.  Security  Both bridges and routers provide the ability to put“security walls” around specific stations.  Routers generally provide greater security than bridges  Because  they can be addressed directly and  They use additional data for implementing security