SlideShare a Scribd company logo
PRESENTERS :-
VARUN SACHDEVA
ABHISHEK
KHYATI MATHUR
PRABHDEEP KAUR
Presentation :’Firewalls’
1
Introduction
 FireWall is device that provides secure connectivity between
networks..
 A firewall may be a hardware, software, or a combination of
both that is used to prevent unauthorized programs or Internet
users from accessing a private network and/or a single computer.
2
Hardware vs. Software Firewalls
3
 Hardware Firewalls
 Protect an entire network
 Implemented on the router level
 Usually more expensive, harder to configure
 Software Firewalls
 Protect a single computer
 Usually less expensive, easier to configure
How does a software firewall work?
4
 Inspects each individual “packet” of data as it arrives at either
side of the firewall
 Determines whether it should be allowed to pass through or if it
should be blocked
Types of Firewalls
 Common types of Firewalls:
1. Packet-filtering routers
2. Application-level gateways1
3. Circuit-level gateways1
5
6
◦ Packet-filtering Router
• Applies a set of rules to each incoming IP packet
and then forwards or discards the packet
◦ Filter packets going in both directions
◦ The packet filter is typically set up as a list of
rules based on matches to fields in the IP or TCP
header
◦ Two default policies (discard or forward)
7
Packet Filtering Firewall
Trusted
Network
Firewall
rule set
Packet is Blocked or Discarded
Untrusted
Network
8
Packet Filtering Firewall
A packet filtering firewall is often called a network layer firewall
because the filtering is primarily done at the network layer (layer
three) or the transport layer (layer four) of the OSI reference
model.
9
 Application-level Gateway
 Gateway sits between user on inside and server on outside. Instead of
talking directly, user and server talk through proxy.
 Allows more fine grained and sophisticated control than packet
filtering. For example, ftp server may not allow files greater than a set
size.
 A mail server is an example of an application gateway
◦ Can’t deposit mail in recipient’s mail server without passing through
sender’s mail server
host-to-gateway
ftp session
gateway-to-remote
host ftp session
application
gateway
10
Application Gateways/Proxies
11
Circuit-level Gateway
1. Stand-alone system
2. Specialized function performed by an Application-level Gateway
3. Sets up two TCP connections
4. The security function consists of determining which connections
will be allowed
5. Typically use is a situation in which the system administrator
trusts the internal users
12
Circuit-level Gateway
Firewall Rules
13
 Allow – traffic that flows automatically because it has been
deemed
 Block – traffic that is blocked because it has been deemed
dangerous to your computer
 Ask – asks the user whether or not the traffic is allowed to pass
through
Making The Firewall Fit
 IP address
 Domain names
 Protocols
14
What It Protects You From
 Remote login
 Simple Mail Transfer Protocol session hijacking
 Operating system bugs
 Spam
15
16
Conclusion
17
What a personal firewall can do ?
• Stop hackers from accessing your computer.
• Protects your personal information.
• Blocks “pop up” ads and certain cookies.
• Determines which programs can access the Internet.
• Block invalid packets.
18
• What a personal firewall cannot do ?
• Cannot prevent e-mail
viruses
– Only an antivirus product
with updated definitions can
prevent e-mail viruses.
• After setting it initially, you cannot forget about it
– The firewall will require periodic updates to the rulesets
and the software itself.
19
Thank you

More Related Content

PPTX
Firewall basics
PPTX
Linta
PPTX
Linux and firewall
PPTX
Firewalls and packet filters
PPT
Firewalls
PPT
Firewall
PPT
Firewalls
PPT
Windows 7 firewall & its configuration
Firewall basics
Linta
Linux and firewall
Firewalls and packet filters
Firewalls
Firewall
Firewalls
Windows 7 firewall & its configuration

What's hot (20)

PPTX
PPTX
Cyber security tutorial2
PPT
Firewall Essentials
PPTX
Cyber security tutorial1
PPTX
Firewall presentation
PPTX
Prensentation on packet sniffer and injection tool
PPTX
Firewall and Types of firewall
PPT
Firewall
PPTX
Gateway and firewall
PPSX
Firewall & its Services
PPTX
Network protocols and vulnerabilities
PPTX
The Perfect Linux Security Firewalls
PPTX
Network sniffers & injection tools
PPTX
Wiretapping
PPTX
Cyber Security - Firewall and Packet Filters
PPTX
Types of firewall
PPT
Firewall presentation m. emin özgünsür
PPTX
Topic22
PPTX
Firewall
Cyber security tutorial2
Firewall Essentials
Cyber security tutorial1
Firewall presentation
Prensentation on packet sniffer and injection tool
Firewall and Types of firewall
Firewall
Gateway and firewall
Firewall & its Services
Network protocols and vulnerabilities
The Perfect Linux Security Firewalls
Network sniffers & injection tools
Wiretapping
Cyber Security - Firewall and Packet Filters
Types of firewall
Firewall presentation m. emin özgünsür
Topic22
Firewall
Ad

Viewers also liked (20)

PDF
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
PDF
UNIVERSIDAD METROPOLITANA
PDF
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
PPTX
1413315061 chapter7
PDF
Transcript
PDF
CARP: AN IMAGE BASED SECURITY USING I-PAS
PDF
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
PPT
презентация 4
PPTX
Providing incentives
PDF
Untitled Presentation
PDF
INVESTMENT AND ECONOMIC GROWTH IN SUDAN: AN EMPIRICAL INVESTIGATION, 1999-2011
PDF
http://ijtra.com/view/role-of-power-electronics-in-non-renewable-and-renewabl...
PPT
сокальщина гра
PDF
DEVELOPMENT OF A SOFTWARE MAINTENANCE COST ESTIMATION MODEL: 4 TH GL PERSPECTIVE
PDF
Omnichannel cases
PDF
PPT
2015 опис досвіду обдаровані блог
DOC
Ua sl take-home exam-s2-akk-ikm-2015
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
UNIVERSIDAD METROPOLITANA
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
1413315061 chapter7
Transcript
CARP: AN IMAGE BASED SECURITY USING I-PAS
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
презентация 4
Providing incentives
Untitled Presentation
INVESTMENT AND ECONOMIC GROWTH IN SUDAN: AN EMPIRICAL INVESTIGATION, 1999-2011
http://ijtra.com/view/role-of-power-electronics-in-non-renewable-and-renewabl...
сокальщина гра
DEVELOPMENT OF A SOFTWARE MAINTENANCE COST ESTIMATION MODEL: 4 TH GL PERSPECTIVE
Omnichannel cases
2015 опис досвіду обдаровані блог
Ua sl take-home exam-s2-akk-ikm-2015
Ad

Similar to Firewallpresentation 100826052003-phpapp02(1) (20)

PPTX
Firewall Design and Implementation
PPTX
Firewall Design and Implementation
PPTX
Firewallpresentation 100826052003-phpapp02
PDF
Firewallpresentation 100826052003-phpapp02
PPTX
firewallpresentation-100826052003-phpapp02.pptx
PPTX
Linta
PPT
Firewall
PPT
Chapter_Five[1].ppt
PPTX
Firewall presentation
PPTX
Firewall & packet filter new
PDF
[9] Firewall.pdf
PPT
firewall.ppt
PPT
Firewall
DOC
Firewall
PPT
Introduction to firewalls
PPTX
Firewalls-Intro
PPTX
Firewall and its Types
PDF
Network Security_Dr Shivashankar_Module 5.pdf
PPT
Unit II Chapter 6 firewalls.ppt
Firewall Design and Implementation
Firewall Design and Implementation
Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02
firewallpresentation-100826052003-phpapp02.pptx
Linta
Firewall
Chapter_Five[1].ppt
Firewall presentation
Firewall & packet filter new
[9] Firewall.pdf
firewall.ppt
Firewall
Firewall
Introduction to firewalls
Firewalls-Intro
Firewall and its Types
Network Security_Dr Shivashankar_Module 5.pdf
Unit II Chapter 6 firewalls.ppt

Recently uploaded (20)

PPTX
Presentacion compuuuuuuuuuuuuuuuuuuuuuuu
PPT
Hypersensitivity Namisha1111111111-WPS.ppt
PPTX
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
PDF
ICT grade for 8. MATATAG curriculum .P2.pdf
PPT
chapter_1_a.ppthduushshwhwbshshshsbbsbsbsbsh
PPTX
A Clear View_ Interpreting Scope Numbers and Features
PPTX
Operating System Processes_Scheduler OSS
PPTX
New professional education PROF-ED-7_103359.pptx
PPTX
material for studying about lift elevators escalation
PPTX
Embedded for Artificial Intelligence 1.pptx
PDF
-DIGITAL-INDIA.pdf one of the most prominent
PPTX
Lecture-3-Computer-programming for BS InfoTech
PPTX
unit1d-communitypharmacy-240815170017-d032dce8.pptx
PDF
How NGOs Save Costs with Affordable IT Rentals
PPTX
Embeded System for Artificial intelligence 2.pptx
PPT
Lines and angles cbse class 9 math chemistry
PPTX
DEATH AUDIT MAY 2025.pptxurjrjejektjtjyjjy
PPTX
Wireless and Mobile Backhaul Market.pptx
DOCX
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
PPTX
Nanokeyer nano keyekr kano ketkker nano keyer
Presentacion compuuuuuuuuuuuuuuuuuuuuuuu
Hypersensitivity Namisha1111111111-WPS.ppt
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
ICT grade for 8. MATATAG curriculum .P2.pdf
chapter_1_a.ppthduushshwhwbshshshsbbsbsbsbsh
A Clear View_ Interpreting Scope Numbers and Features
Operating System Processes_Scheduler OSS
New professional education PROF-ED-7_103359.pptx
material for studying about lift elevators escalation
Embedded for Artificial Intelligence 1.pptx
-DIGITAL-INDIA.pdf one of the most prominent
Lecture-3-Computer-programming for BS InfoTech
unit1d-communitypharmacy-240815170017-d032dce8.pptx
How NGOs Save Costs with Affordable IT Rentals
Embeded System for Artificial intelligence 2.pptx
Lines and angles cbse class 9 math chemistry
DEATH AUDIT MAY 2025.pptxurjrjejektjtjyjjy
Wireless and Mobile Backhaul Market.pptx
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
Nanokeyer nano keyekr kano ketkker nano keyer

Firewallpresentation 100826052003-phpapp02(1)

  • 1. PRESENTERS :- VARUN SACHDEVA ABHISHEK KHYATI MATHUR PRABHDEEP KAUR Presentation :’Firewalls’ 1
  • 2. Introduction  FireWall is device that provides secure connectivity between networks..  A firewall may be a hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. 2
  • 3. Hardware vs. Software Firewalls 3  Hardware Firewalls  Protect an entire network  Implemented on the router level  Usually more expensive, harder to configure  Software Firewalls  Protect a single computer  Usually less expensive, easier to configure
  • 4. How does a software firewall work? 4  Inspects each individual “packet” of data as it arrives at either side of the firewall  Determines whether it should be allowed to pass through or if it should be blocked
  • 5. Types of Firewalls  Common types of Firewalls: 1. Packet-filtering routers 2. Application-level gateways1 3. Circuit-level gateways1 5
  • 6. 6 ◦ Packet-filtering Router • Applies a set of rules to each incoming IP packet and then forwards or discards the packet ◦ Filter packets going in both directions ◦ The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header ◦ Two default policies (discard or forward)
  • 7. 7 Packet Filtering Firewall Trusted Network Firewall rule set Packet is Blocked or Discarded Untrusted Network
  • 8. 8 Packet Filtering Firewall A packet filtering firewall is often called a network layer firewall because the filtering is primarily done at the network layer (layer three) or the transport layer (layer four) of the OSI reference model.
  • 9. 9  Application-level Gateway  Gateway sits between user on inside and server on outside. Instead of talking directly, user and server talk through proxy.  Allows more fine grained and sophisticated control than packet filtering. For example, ftp server may not allow files greater than a set size.  A mail server is an example of an application gateway ◦ Can’t deposit mail in recipient’s mail server without passing through sender’s mail server host-to-gateway ftp session gateway-to-remote host ftp session application gateway
  • 11. 11 Circuit-level Gateway 1. Stand-alone system 2. Specialized function performed by an Application-level Gateway 3. Sets up two TCP connections 4. The security function consists of determining which connections will be allowed 5. Typically use is a situation in which the system administrator trusts the internal users
  • 13. Firewall Rules 13  Allow – traffic that flows automatically because it has been deemed  Block – traffic that is blocked because it has been deemed dangerous to your computer  Ask – asks the user whether or not the traffic is allowed to pass through
  • 14. Making The Firewall Fit  IP address  Domain names  Protocols 14
  • 15. What It Protects You From  Remote login  Simple Mail Transfer Protocol session hijacking  Operating system bugs  Spam 15
  • 17. 17 What a personal firewall can do ? • Stop hackers from accessing your computer. • Protects your personal information. • Blocks “pop up” ads and certain cookies. • Determines which programs can access the Internet. • Block invalid packets.
  • 18. 18 • What a personal firewall cannot do ? • Cannot prevent e-mail viruses – Only an antivirus product with updated definitions can prevent e-mail viruses. • After setting it initially, you cannot forget about it – The firewall will require periodic updates to the rulesets and the software itself.