A firewall is a hardware or software barrier that protects private networks from unauthorized access from outside networks. There are two main types - hardware firewalls which are physical devices installed between networks, and software firewalls which are installed on individual computers. Common firewall techniques include packet filtering, application gateways, circuit-level gateways, and bastion hosts. A firewall examines all incoming and outgoing network traffic and blocks unauthorized traffic based on predefined security rules.
Define whatis firewall ?
Need of firewall
Types of firewall
› Hardware firewall
Advantage and disadvantage
› Software firewall
Advantage and disadvantage
3.
Types offirewall techniques
› Packet filter
Drawback of packet filtering
› Application gateway
advantage
› Circuit-level gateway
› Bastion host
What a personal firewall can do
What a personal firewall can not do
Manufacturing companies
4.
Firewall isdevice that provides secure
connectivity between
networks(internal/external).
5.
A firewallmay be a hardware, software of a
combination of both that is used to prevent
unauthorized program or internet users from
accessing a private network or a single
computer.
All message entering or leaving the intranet
pass through the firewall, which examines
each message & blocks those that do not
meet the specified security criteria.
6.
To protectconfidential
information from those
who do not explicitly need
to access it.
To protect our network &
its resources from
malicious users &
accidents that originate
outside of our network.
It isa physical device.
It can be installed
between the modem and
computer.
It can be incorporated
into a broadband router
being used to share the
internet connection.
9.
Protect anentire network.
Usually more expensive, header to configure
E.g.- Cisco pix, netscreen, watchfuard etc.
10.
Uses verylittle system resources.
More secure
Enhanced security control
Dedicated hardware firewalls are typically more
reliable
Easy to disable or remove
Work independently of associated computer
system.
11.
Install processis more demanding both
physically and mentally.
Takes up physical work space
More expensive
Harder to upgrade and repair
12.
It isa software
application.
It is installed onto the
computer system that
you wish to protect .
13.
Protect asingle computer
This is usually the computer with modem
attached to it.
Usually less expensive, easier to configure
E.g.- Norton internet security, MacAfee
internet security etc.
14.
Considerably cheaperor even free.
Simple to install and upgrade
Requires no physical changes to hardware
or network
Ideal for home/family use
Takes up no physical space.
15.
Software maycrash or be incompatible with
system
Can be difficult to completely disable &
especially remove
Software bugs may compromise security
Can be resource hungry
Incompatibilities with OS.
It looksat each packet entering or leaving
the network accepts or rejects it based on
user-defined rules.
Applications
Presentations
Sessions
Transport
Data Link
Physical
Data Link
Physical
Router
Applications
Presentations
Sessions
Transport
Data Link
Physical
Network Network
18.
Packet filteringis fairly effective &
transparent to users, but it is difficult to
configure.
In addition, it is susceptible to IP spoofing.
19.
Drawback ofpacket filtering technique:-
i. Packet filtering rules can be complex.
ii. Logging facility is not provided by such
firewall.
iii. If TCP/IP packet filtering is not implemented
fully, it can lead to security hole.
iv. Cannot handle RPC (remote produce calls)
20.
In suchtype of firewall remote host or
network can interact only with proxy server,
proxy server is responsible for hiding the
details of the internal network i.e. intranet.
Users uses TCP/IP application, such as FTP
& Telnet servers.
This isvery effective, but can impose a
performance degradation.
23.
Advantages ofapplication gateway:-
i. Less complex filter rules
ii. Cost effectiveness
iii. Robust authentication & logging facility
iv. Proxy authenticates only those services for
v. Which it is configured/installed.
24.
It isa stand alone application.
It does not permit end-to-end TCP connection. it
sets up 2 TCP connection:-
• Between itself and a TCP user on an inner host.
• Between itself and a TCP user on an outer host.
25.
Bastion hostis a special purpose computer
on a network specifically designed and
configured to withstand attacks.
26.
It generallyhosts a single application,
provides platform for application gateway
and circuit-level gateway.
It supports limited/specific applications to
reduce the threat to the computer.
Include application-Telnet, SMTP, FTP
27.
Stop hackersfrom accessing your
computer.
Protect your personal information.
Blocks “pop up” ads and certain
cookies.
Determines which programs can
access the internet.
Block invalid packets.
28.
Cannot prevente-mail
viruses
-only an antivirus product
with update definitions
can prevent e-mail viruses.
After setting it initially,
you cannot forget about it
-The firewall will require
periodic updates to the rule sets and the software itself.