N A V D E E P S I N G H
Firewall & its Services
What is a Firewall ?
 Firewall is a device or a software feature designed to
control the flow of trafic into and out-of a network.
 Firewall interconnects networks with different trust.
 Firewall implements and enforces a security policy
between networks.
Firewall Zones
Trusted Zone
Untrusted Zone
Demilitarized Zone(DMZ)
Firewall Zones
Trusted Zone
 By default the LAN is trusted.
 Trusted zone contains a numerical value of 100
which means highest level of trust.
Untrusted Zone
 Untrusted zone contains a numerical value of 0
which means lowest level of trust.
 A WAN port can only be mapped to an Untrusted
Zone.
Firewall Zones
Demilitarized Zone
 DMZs are less trusted zones
 Public Zone is demilitarized zone and has a trust
value of 50
Types of Firewalls
Software Based Firewalls
 Run as additional program on Personal Computers
 Known as Personal Firewalls
 Most of the SBFs get automatically configured and
updated after installation.
 Examples of SBFs are:- Windows Firewall,
Kaspersky Firewall, Zone Alarm Pro Firewall
 Also there are some open source firewall available.
Exa:- OpenWRT, PfSense, Untangle Gateway, IPcop.
Types of Firewalls
Hardware Based Firewalls
 Hardware based firewalls are the first line of defense against the
cyber attacks.
 HBFs are more expensive as compared to SBFs.
 Traditionally HBFs were only used to carry out Packet Filtering.
 Today HBFs have built-in Intrusion Prevention System and
Intrusion Detection System IPS/IDPS
 When IDPS detects a malicious activity it sends a signal, drops
the packet, blocks the IP and resets the connection.
 Some Hardware Based Firewall providers are:
 CISCO
 ProSafe
 D-Link
 SonicWall
 Netgear
Cisco Firewalls
Cisco Firepower 9300 (Latest Series-9000 & 4100)
 1.2 Tbps clustered throughput
 57 million concurrent connections, with application control
 500,000 new connections per second
 High-end Next Gen. Firewall (NGFW)
Firewall Services
The following services are provided by Firewalls:
 Packet Filtering
 Stateful packet Inspection
 Proxying
 Authentication
 Logging
 Content Filtering
 Network Address Translation
Packet Filtering
 Each incoming data packet is examined by the firewall.
 The header of the each packet is compared to the pre-
configured set of rules.
 An allow or deny decision is made based on the results.
 Rules of packet filtering are:
 Protocol Type (TCP,IP,UDP,ICMP,ESP,etc)
 Source Address
 Source Port
 Destination Address
 Destination Port
Packet Filtering
 Packet Filtering Firewalls works on the Network
Layer (layer 3) and Transport Layer (layer 4) of the
OSI model of reference.
Stateful Packet Inspection
 All packets are examined and the header information
is stored in dynamic state session table.
 State table is used verify the data packets from the
same connection.
 The rules of stateful packet inspection are:
 Protocol Type (TCP,IP,UDP,ICMP,ESP,etc)
 Source Address
 Source Port
 Destination Address
 Destination Port
 Connection State
Stateful Packet Inspection
 In Stateful Packet Inspection technique the firewall
examines the headers of all incoming data packets
from the level of network layer to the application
layer of the OSI Model of reference.
Proxy Services
 Proxy/Application gateway acts as an intermediate between
the connections.
 Each connection can only communicate with other by going
through the proxy/application gateway.
 Proxy/Application gateway operates at the Application
layer (Layer 7) of the OSI Model of reference.
 When a client issues a request from an untrusted network,
a connection is established between the client and
proxy/gateway. The proxy/gateway compares the request
to the set of rules, if finds the request valid, it sends a
connection request to the destination on the behalf of the
client.
Proxy Services
Proxy Servers also provide some other services:
 Logging:-Proxy servers makes log of the each
communication.
 Content Filtering
 Authentication
NAT(Network Address Translation)
 NAT is a method that enables hosts on private networks to
communicate with hosts on the Internet.
 NAT is mostly used to translate between public address and
private address.
 NAT can be also used for Public to Public Address Translation
and Private to Private Address Translation.
 NAT hides the IP address and IP address structure of the
internal network.
 In NAT the actual IP address/port used in an internal network
is translated to the outside IP address/outside port.
 This is done by replacing the local IP address from the header
of the data packet with the outside IP address.
Types of NAT
Static NAT
 Static NAT performs one to one translation between two
addresses or between a port on one address to a port on
another address.
Types of NAT
Static NAT
 Static NAT maps a block on external IP addresses to
the same size block of internal IP addresses.
 NAT maps a specific port to come through the firewall
rather than all ports.
 Static NAT allows the internal client to maintain their
set-up information.
 Multiple ISP’s can be enlisted to provide a degree of
fault-tolerant access to the system. If network
performance or quality degrades, connections can be
swapped to another supplier.
Dynamic NAT
 Dynamic does not perform one to one translation but
instead maps a group on internal IP addresses to a
pool of external IP addresses.
Dynamic NAT
 These mappings can be set to expire if they are not used
within a programmable period of time.
 Dynamic NAT works as firewall between internal network
and the outside network or internet.
 Dynamic NAT only allows the connections that originate
inside the internal domain.
 A computer on an external network can not connect to one
of the internal servers unless the internal node has initiated
the contact.
Load Sharing NAT
 Load Sharing NAT(LSNAT) distributes a session load
across a pool of servers.
 LSNAT is most often used in embedded server farms where
a single blade server is unable to handle the increasing
number of clients or sessions.
References
 Intro_firewalls by Aaron Balchunas (routeralely.com)
 University of Cambridge-University Information Services
(Academic & Infrastructure)-” Firewalls and Network
Address Translation”.
 CISCO-Security Guide, Cisco ACE Application Control
Engine-”Configuring Network Address Translation”
 University of Virginia-Department of Computer Science-
”module17-nat”
 CISCO NGFW-product guide-Firepower 9300 -“at-a-
glance-c45-734810.pdf”, Title “Threat-Centric Security for
Service Providers “
Thank You

More Related Content

PDF
FIREWALL
PPTX
Firewall and Types of firewall
PPT
Windows 7 firewall & its configuration
PPT
Firewall protection
PDF
Firewall & types of Firewall
PPT
Firewall
PPTX
Types Of Firewall Security
DOCX
FIREWALL
Firewall and Types of firewall
Windows 7 firewall & its configuration
Firewall protection
Firewall & types of Firewall
Firewall
Types Of Firewall Security

What's hot (19)

PPTX
Firewall security in computer network
DOCX
Firewall configuration
PPTX
Firewalls and packet filters
PDF
Network firewall function & benefits
PPT
Firewalls
PPT
Firewall presentation m. emin özgünsür
PPT
Firewall Security Definition
PPTX
Firewall
PPTX
Firewall and its purpose
PPTX
Firewall & packet filter new
PPTX
Firewall basics
PPT
FireWall
PPTX
Firewall presentation
PPTX
Types of firewall
PPTX
PPT
Data security in local network using distributed firewall ppt
Firewall security in computer network
Firewall configuration
Firewalls and packet filters
Network firewall function & benefits
Firewalls
Firewall presentation m. emin özgünsür
Firewall Security Definition
Firewall
Firewall and its purpose
Firewall & packet filter new
Firewall basics
FireWall
Firewall presentation
Types of firewall
Data security in local network using distributed firewall ppt
Ad

Viewers also liked (17)

PPT
Переговори - як підготвуватися та отримати максимальлний результат
PPT
Aprentacao projetor
PDF
908140239254 pay slipreport
PDF
Особенности использования машинного обучения при защите от DDoS-атак
PPS
Lviv PM Club (January) Роман Грисьо - як ефективний інструмент управління ко...
PPTX
Competitive Analysis 2
PPTX
Geometry hunt in our school
PPTX
Service Provider Deployment of DDoS Mitigation
PPSX
Event introduction - Microsoft for Charities Event Ireland
PPT
Μεταφορά στα φυτά
PDF
OTF Connect Webinar - Exploring Proportional Reasoning Through a 4-Part Math ...
PDF
Затяжной спад в экономике: Что предпринимают потребители и бизнес в России
PDF
Three phase vector groups
PPTX
Introduction to Arduino
PPT
Firewall
PPTX
Περσέας και Μέδουσα
PPTX
Skateboarding (1)
Переговори - як підготвуватися та отримати максимальлний результат
Aprentacao projetor
908140239254 pay slipreport
Особенности использования машинного обучения при защите от DDoS-атак
Lviv PM Club (January) Роман Грисьо - як ефективний інструмент управління ко...
Competitive Analysis 2
Geometry hunt in our school
Service Provider Deployment of DDoS Mitigation
Event introduction - Microsoft for Charities Event Ireland
Μεταφορά στα φυτά
OTF Connect Webinar - Exploring Proportional Reasoning Through a 4-Part Math ...
Затяжной спад в экономике: Что предпринимают потребители и бизнес в России
Three phase vector groups
Introduction to Arduino
Firewall
Περσέας και Μέδουσα
Skateboarding (1)
Ad

Similar to Firewall & its Services (20)

PPTX
Module 7 Firewalls Part - 2 Presentation
PPTX
Chapter_1_Introduction to Network Security-1.pptx
PPT
Network security
PPSX
Network & security startup
PPT
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
PPT
Network Security Firewalls (description).ppt
PPT
Network security chapter 6 and 7 internet architecture
PPTX
Cyber security tutorial2
PPT
Firewall
PPTX
FIREWALLS BY SAIKIRAN PANJALA
PPT
Firewalls (1056778990099000000000000).ppt
PPT
PPTX
Firewall & DMZ.pptx
PPTX
Firewalls
PPTX
Network defenses
PPT
Network and security concepts
PDF
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
PDF
Introduction to firewalls
PPTX
Firewalls-Intro
PPT
Ch05 Network Defenses
Module 7 Firewalls Part - 2 Presentation
Chapter_1_Introduction to Network Security-1.pptx
Network security
Network & security startup
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Network Security Firewalls (description).ppt
Network security chapter 6 and 7 internet architecture
Cyber security tutorial2
Firewall
FIREWALLS BY SAIKIRAN PANJALA
Firewalls (1056778990099000000000000).ppt
Firewall & DMZ.pptx
Firewalls
Network defenses
Network and security concepts
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Introduction to firewalls
Firewalls-Intro
Ch05 Network Defenses

Recently uploaded (20)

PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PPTX
The-Importance-of-School-Sanitation.pptx
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PDF
Containerization lab dddddddddddddddmanual.pdf
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PPTX
Database Information System - Management Information System
PPTX
Internet Safety for Seniors presentation
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PPT
12 Things That Make People Trust a Website Instantly
PPTX
t_and_OpenAI_Combined_two_pressentations
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PPTX
Cyber Hygine IN organizations in MSME or
PPTX
TITLE DEFENSE entitle the impact of social media on education
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
The-Importance-of-School-Sanitation.pptx
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
AI_Cyberattack_Solutions AI AI AI AI .pptx
Containerization lab dddddddddddddddmanual.pdf
Layers_of_the_Earth_Grade7.pptx class by
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Database Information System - Management Information System
Internet Safety for Seniors presentation
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
12 Things That Make People Trust a Website Instantly
t_and_OpenAI_Combined_two_pressentations
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
Cyber Hygine IN organizations in MSME or
TITLE DEFENSE entitle the impact of social media on education

Firewall & its Services

  • 1. N A V D E E P S I N G H Firewall & its Services
  • 2. What is a Firewall ?  Firewall is a device or a software feature designed to control the flow of trafic into and out-of a network.  Firewall interconnects networks with different trust.  Firewall implements and enforces a security policy between networks.
  • 3. Firewall Zones Trusted Zone Untrusted Zone Demilitarized Zone(DMZ)
  • 4. Firewall Zones Trusted Zone  By default the LAN is trusted.  Trusted zone contains a numerical value of 100 which means highest level of trust. Untrusted Zone  Untrusted zone contains a numerical value of 0 which means lowest level of trust.  A WAN port can only be mapped to an Untrusted Zone.
  • 5. Firewall Zones Demilitarized Zone  DMZs are less trusted zones  Public Zone is demilitarized zone and has a trust value of 50
  • 6. Types of Firewalls Software Based Firewalls  Run as additional program on Personal Computers  Known as Personal Firewalls  Most of the SBFs get automatically configured and updated after installation.  Examples of SBFs are:- Windows Firewall, Kaspersky Firewall, Zone Alarm Pro Firewall  Also there are some open source firewall available. Exa:- OpenWRT, PfSense, Untangle Gateway, IPcop.
  • 7. Types of Firewalls Hardware Based Firewalls  Hardware based firewalls are the first line of defense against the cyber attacks.  HBFs are more expensive as compared to SBFs.  Traditionally HBFs were only used to carry out Packet Filtering.  Today HBFs have built-in Intrusion Prevention System and Intrusion Detection System IPS/IDPS  When IDPS detects a malicious activity it sends a signal, drops the packet, blocks the IP and resets the connection.  Some Hardware Based Firewall providers are:  CISCO  ProSafe  D-Link  SonicWall  Netgear
  • 8. Cisco Firewalls Cisco Firepower 9300 (Latest Series-9000 & 4100)  1.2 Tbps clustered throughput  57 million concurrent connections, with application control  500,000 new connections per second  High-end Next Gen. Firewall (NGFW)
  • 9. Firewall Services The following services are provided by Firewalls:  Packet Filtering  Stateful packet Inspection  Proxying  Authentication  Logging  Content Filtering  Network Address Translation
  • 10. Packet Filtering  Each incoming data packet is examined by the firewall.  The header of the each packet is compared to the pre- configured set of rules.  An allow or deny decision is made based on the results.  Rules of packet filtering are:  Protocol Type (TCP,IP,UDP,ICMP,ESP,etc)  Source Address  Source Port  Destination Address  Destination Port
  • 11. Packet Filtering  Packet Filtering Firewalls works on the Network Layer (layer 3) and Transport Layer (layer 4) of the OSI model of reference.
  • 12. Stateful Packet Inspection  All packets are examined and the header information is stored in dynamic state session table.  State table is used verify the data packets from the same connection.  The rules of stateful packet inspection are:  Protocol Type (TCP,IP,UDP,ICMP,ESP,etc)  Source Address  Source Port  Destination Address  Destination Port  Connection State
  • 13. Stateful Packet Inspection  In Stateful Packet Inspection technique the firewall examines the headers of all incoming data packets from the level of network layer to the application layer of the OSI Model of reference.
  • 14. Proxy Services  Proxy/Application gateway acts as an intermediate between the connections.  Each connection can only communicate with other by going through the proxy/application gateway.  Proxy/Application gateway operates at the Application layer (Layer 7) of the OSI Model of reference.  When a client issues a request from an untrusted network, a connection is established between the client and proxy/gateway. The proxy/gateway compares the request to the set of rules, if finds the request valid, it sends a connection request to the destination on the behalf of the client.
  • 15. Proxy Services Proxy Servers also provide some other services:  Logging:-Proxy servers makes log of the each communication.  Content Filtering  Authentication
  • 16. NAT(Network Address Translation)  NAT is a method that enables hosts on private networks to communicate with hosts on the Internet.  NAT is mostly used to translate between public address and private address.  NAT can be also used for Public to Public Address Translation and Private to Private Address Translation.  NAT hides the IP address and IP address structure of the internal network.  In NAT the actual IP address/port used in an internal network is translated to the outside IP address/outside port.  This is done by replacing the local IP address from the header of the data packet with the outside IP address.
  • 17. Types of NAT Static NAT  Static NAT performs one to one translation between two addresses or between a port on one address to a port on another address.
  • 18. Types of NAT Static NAT  Static NAT maps a block on external IP addresses to the same size block of internal IP addresses.  NAT maps a specific port to come through the firewall rather than all ports.  Static NAT allows the internal client to maintain their set-up information.  Multiple ISP’s can be enlisted to provide a degree of fault-tolerant access to the system. If network performance or quality degrades, connections can be swapped to another supplier.
  • 19. Dynamic NAT  Dynamic does not perform one to one translation but instead maps a group on internal IP addresses to a pool of external IP addresses.
  • 20. Dynamic NAT  These mappings can be set to expire if they are not used within a programmable period of time.  Dynamic NAT works as firewall between internal network and the outside network or internet.  Dynamic NAT only allows the connections that originate inside the internal domain.  A computer on an external network can not connect to one of the internal servers unless the internal node has initiated the contact.
  • 21. Load Sharing NAT  Load Sharing NAT(LSNAT) distributes a session load across a pool of servers.  LSNAT is most often used in embedded server farms where a single blade server is unable to handle the increasing number of clients or sessions.
  • 22. References  Intro_firewalls by Aaron Balchunas (routeralely.com)  University of Cambridge-University Information Services (Academic & Infrastructure)-” Firewalls and Network Address Translation”.  CISCO-Security Guide, Cisco ACE Application Control Engine-”Configuring Network Address Translation”  University of Virginia-Department of Computer Science- ”module17-nat”  CISCO NGFW-product guide-Firepower 9300 -“at-a- glance-c45-734810.pdf”, Title “Threat-Centric Security for Service Providers “