SlideShare a Scribd company logo
Lesson 10-Firewalls
Overview



Defining the types of firewalls.

Developing a firewall configuration.

Designing a firewall rule set.
Overview



A firewall is a network access control device.

It can perform a centralized security management function.

It denies all traffic except that which is explicitly allowed.

It can be configured based on services, source or

destination IP address, and the user ID.
Defining the Types of
        Firewalls


Application layer firewalls.

Packet filtering firewalls.

Hybrids.
Application Layer Firewalls



Application layer firewalls (proxy firewalls) are software

packages that reside on operating systems or on firewall

appliances.

Firewalls have multiple interfaces.

All connections terminate on the firewall.

They use proxies for inbound connections.
Application Layer Firewalls



A set of policy rules defines how traffic from one network is

transported to any other.

If no rule exists, firewalls deny or drop the data packets.

Policy rules are enforced through the use of proxies.

Each protocol on a firewall must have its own proxy.
Application Layer Firewalls




Application layer firewall proxy connections
Packet Filtering Firewalls



Policy rules are enforced using packet inspection filters.

If a protocol runs over UDP, the packet filtering firewall

tracks the state of the UDP traffic.

Connections do not terminate on the firewall.

They do not rely on proxies for each protocol.

They support network address translation.
Packet Filtering Firewalls




Traffic through a packet filtering firewall
Hybrids



Hybrid firewalls provide a way for handling protocols for

which specific proxies do not exist.

The generic services proxy (GSP) allows application layer

proxies to handle other protocols.

In a hybrid system, the GSP behaves like packet filtering

firewalls.
Developing a Firewall
        Configuration


Organization’s Internet policy allows users to use services

such as HTTP, HTTPS, FTP, Telnet, and SSH.

Based on the Internet policy, a set of policy rules for

various architectures can be constructed.
Developing a Firewall
            Configuration


Architecture 1: Internet accessible systems outside the

firewall.

Architecture 2: Single firewall.

Architecture 3: Dual Firewall.
Internet Accessible Systems




Architecture #1: Internet systems accessible to outside the firewall.
Internet Accessible Systems




  Firewall Rules for Internet Systems
    Accessible Outside the Firewall.
Single Firewall




   Architecture #2: Single firewall.
Single Firewall




 Firewall Rules for the Single Firewall
             Architecture.
Dual Firewalls




   Architecture #3: Dual Firewalls.
Dual Firewalls




Firewall Rules for Firewall #1 in the Dual
          Firewall Architecture.
Dual Firewalls




Firewall Rules for Firewall #2 in the Dual
          Firewall Architecture.
Designing a Firewall Rule Set



When designing a firewall rule set, the first match algorithm

dictates:

      The most specific rules to be placed at the top of the rule

      set.

      The least specific rules to be placed at the bottom of the

      rule set.
Designing a Firewall Rule Set



To define a general rule set, examine:

     The expected traffic load of the firewall.

     Rank the traffic types in order. The Internet service with the

     largest traffic at the top of the rule set.

     Place any deny rules pertaining to the protocol.
Summary



A firewall is a network access control device, available as

application layer and packet filtering firewalls.

A combination of these firewalls can also be used.

Application layer or proxy firewalls use proxies for

connections.

In this setup, all connections terminate on the firewall.
Summary



Unlike the application layer, the packet filtering firewalls

enforce policy rules using packet inspection filters.

A firewall can be configured as single, dual or placing

Internet accessible systems outside the firewall.

In a firewall rule set, place the specific rules on top and the

least specific rules at the bottom.

More Related Content

PPTX
Types Of Firewall Security
PPTX
Firewalls and packet filters
PPTX
Firewall and its Types
PPT
Firewals in Network Security NS10
PPT
Firewalls
PDF
session7 Firewalls and VPN
PPT
Firewalls
Types Of Firewall Security
Firewalls and packet filters
Firewall and its Types
Firewals in Network Security NS10
Firewalls
session7 Firewalls and VPN
Firewalls

What's hot (20)

PPTX
Linux and firewall
PPTX
Firewall and It's Types
PPTX
Types of firewall
PPT
Windows 7 firewall & its configuration
PPTX
Firewall and Types of firewall
PPSX
Firewall & its Services
PPT
Firewall
PPT
Advance firewalls
DOC
Firewall
 
PPTX
Firewall management introduction
PPTX
Firewall basics
DOCX
PPT
Intoduction to Network Security NS1
PPT
Firewalls
PPTX
The Perfect Linux Security Firewalls
PPT
Firewalls
PPTX
PPT
Firewalls
PPTX
Firewall
PPTX
Firewall Basing
Linux and firewall
Firewall and It's Types
Types of firewall
Windows 7 firewall & its configuration
Firewall and Types of firewall
Firewall & its Services
Firewall
Advance firewalls
Firewall
 
Firewall management introduction
Firewall basics
Intoduction to Network Security NS1
Firewalls
The Perfect Linux Security Firewalls
Firewalls
Firewalls
Firewall
Firewall Basing
Ad

Viewers also liked (6)

PPTX
Firewall Rule Review and Modelling
PDF
Firewall girija ppt
PPT
Network security
PPTX
Как получить максимум от сетевого экрана Cisco ASA?
PPT
Internet Access Via Cable Network
PDF
Network Security Presentation
Firewall Rule Review and Modelling
Firewall girija ppt
Network security
Как получить максимум от сетевого экрана Cisco ASA?
Internet Access Via Cable Network
Network Security Presentation
Ad

Similar to Ch10 Firewall it-slideshares.blogspot.com (20)

PPTX
firewall and its types
PPTX
firrewall and intrusion prevention system.pptx
PDF
Interfirewall optimization across various administrative domain for enabling ...
PPTX
Firewall presentation
PDF
Auto Finding and Resolving Distributed Firewall Policy
PPTX
Firewall
PPTX
FIREWALL
PDF
Cyber Security Notes Unit 5 for Engineering
PPTX
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
PPTX
FIREWALLS BY SAIKIRAN PANJALA
PDF
UNIT 4 Firewalls Information Security Sharad Institute
PPTX
Firewall basics - types,architecture ,defination
PPTX
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
PPTX
csefirewall in network.ppt-170825044521.pptx
PDF
[9] Firewall.pdf
PDF
Firewall
PDF
Firewall.pdf
PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
PPTX
Firewall
firewall and its types
firrewall and intrusion prevention system.pptx
Interfirewall optimization across various administrative domain for enabling ...
Firewall presentation
Auto Finding and Resolving Distributed Firewall Policy
Firewall
FIREWALL
Cyber Security Notes Unit 5 for Engineering
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALLS BY SAIKIRAN PANJALA
UNIT 4 Firewalls Information Security Sharad Institute
Firewall basics - types,architecture ,defination
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
csefirewall in network.ppt-170825044521.pptx
[9] Firewall.pdf
Firewall
Firewall.pdf
Principles of Information Security 6th Edition Whitman Solutions Manual
Firewall

More from phanleson (20)

PDF
Learning spark ch01 - Introduction to Data Analysis with Spark
PPT
Firewall - Network Defense in Depth Firewalls
PPT
Mobile Security - Wireless hacking
PPT
Authentication in wireless - Security in Wireless Protocols
PPT
E-Commerce Security - Application attacks - Server Attacks
PPT
Hacking web applications
PPTX
HBase In Action - Chapter 04: HBase table design
PPT
HBase In Action - Chapter 10 - Operations
PPT
Hbase in action - Chapter 09: Deploying HBase
PPTX
Learning spark ch11 - Machine Learning with MLlib
PPTX
Learning spark ch10 - Spark Streaming
PPTX
Learning spark ch09 - Spark SQL
PPT
Learning spark ch07 - Running on a Cluster
PPTX
Learning spark ch06 - Advanced Spark Programming
PPTX
Learning spark ch05 - Loading and Saving Your Data
PPTX
Learning spark ch04 - Working with Key/Value Pairs
PPTX
Learning spark ch01 - Introduction to Data Analysis with Spark
PPT
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
PPT
Lecture 1 - Getting to know XML
PPTX
Lecture 4 - Adding XTHML for the Web
Learning spark ch01 - Introduction to Data Analysis with Spark
Firewall - Network Defense in Depth Firewalls
Mobile Security - Wireless hacking
Authentication in wireless - Security in Wireless Protocols
E-Commerce Security - Application attacks - Server Attacks
Hacking web applications
HBase In Action - Chapter 04: HBase table design
HBase In Action - Chapter 10 - Operations
Hbase in action - Chapter 09: Deploying HBase
Learning spark ch11 - Machine Learning with MLlib
Learning spark ch10 - Spark Streaming
Learning spark ch09 - Spark SQL
Learning spark ch07 - Running on a Cluster
Learning spark ch06 - Advanced Spark Programming
Learning spark ch05 - Loading and Saving Your Data
Learning spark ch04 - Working with Key/Value Pairs
Learning spark ch01 - Introduction to Data Analysis with Spark
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
Lecture 1 - Getting to know XML
Lecture 4 - Adding XTHML for the Web

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
cuic standard and advanced reporting.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Machine Learning_overview_presentation.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Electronic commerce courselecture one. Pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation theory and applications.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Tartificialntelligence_presentation.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
20250228 LYD VKU AI Blended-Learning.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
SOPHOS-XG Firewall Administrator PPT.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectral efficient network and resource selection model in 5G networks
cuic standard and advanced reporting.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Machine Learning_overview_presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
Electronic commerce courselecture one. Pdf
Group 1 Presentation -Planning and Decision Making .pptx
A Presentation on Artificial Intelligence
Encapsulation theory and applications.pdf

Ch10 Firewall it-slideshares.blogspot.com

  • 2. Overview Defining the types of firewalls. Developing a firewall configuration. Designing a firewall rule set.
  • 3. Overview A firewall is a network access control device. It can perform a centralized security management function. It denies all traffic except that which is explicitly allowed. It can be configured based on services, source or destination IP address, and the user ID.
  • 4. Defining the Types of Firewalls Application layer firewalls. Packet filtering firewalls. Hybrids.
  • 5. Application Layer Firewalls Application layer firewalls (proxy firewalls) are software packages that reside on operating systems or on firewall appliances. Firewalls have multiple interfaces. All connections terminate on the firewall. They use proxies for inbound connections.
  • 6. Application Layer Firewalls A set of policy rules defines how traffic from one network is transported to any other. If no rule exists, firewalls deny or drop the data packets. Policy rules are enforced through the use of proxies. Each protocol on a firewall must have its own proxy.
  • 7. Application Layer Firewalls Application layer firewall proxy connections
  • 8. Packet Filtering Firewalls Policy rules are enforced using packet inspection filters. If a protocol runs over UDP, the packet filtering firewall tracks the state of the UDP traffic. Connections do not terminate on the firewall. They do not rely on proxies for each protocol. They support network address translation.
  • 9. Packet Filtering Firewalls Traffic through a packet filtering firewall
  • 10. Hybrids Hybrid firewalls provide a way for handling protocols for which specific proxies do not exist. The generic services proxy (GSP) allows application layer proxies to handle other protocols. In a hybrid system, the GSP behaves like packet filtering firewalls.
  • 11. Developing a Firewall Configuration Organization’s Internet policy allows users to use services such as HTTP, HTTPS, FTP, Telnet, and SSH. Based on the Internet policy, a set of policy rules for various architectures can be constructed.
  • 12. Developing a Firewall Configuration Architecture 1: Internet accessible systems outside the firewall. Architecture 2: Single firewall. Architecture 3: Dual Firewall.
  • 13. Internet Accessible Systems Architecture #1: Internet systems accessible to outside the firewall.
  • 14. Internet Accessible Systems Firewall Rules for Internet Systems Accessible Outside the Firewall.
  • 15. Single Firewall Architecture #2: Single firewall.
  • 16. Single Firewall Firewall Rules for the Single Firewall Architecture.
  • 17. Dual Firewalls Architecture #3: Dual Firewalls.
  • 18. Dual Firewalls Firewall Rules for Firewall #1 in the Dual Firewall Architecture.
  • 19. Dual Firewalls Firewall Rules for Firewall #2 in the Dual Firewall Architecture.
  • 20. Designing a Firewall Rule Set When designing a firewall rule set, the first match algorithm dictates: The most specific rules to be placed at the top of the rule set. The least specific rules to be placed at the bottom of the rule set.
  • 21. Designing a Firewall Rule Set To define a general rule set, examine: The expected traffic load of the firewall. Rank the traffic types in order. The Internet service with the largest traffic at the top of the rule set. Place any deny rules pertaining to the protocol.
  • 22. Summary A firewall is a network access control device, available as application layer and packet filtering firewalls. A combination of these firewalls can also be used. Application layer or proxy firewalls use proxies for connections. In this setup, all connections terminate on the firewall.
  • 23. Summary Unlike the application layer, the packet filtering firewalls enforce policy rules using packet inspection filters. A firewall can be configured as single, dual or placing Internet accessible systems outside the firewall. In a firewall rule set, place the specific rules on top and the least specific rules at the bottom.