Firewall
Firewall
Contents
 Introduction
 What is a Firewall
 How it works
 Applications of Firewall
 Software Firewall vs Hardware Firewall
 History
 Design goals for Firewall
Contents…
 Types
 Role of Firewall
 What about Viruses
 Advantages
 Disadvantages
 Conclusion
Introduction
 The Internet has made large amount of information available to
the average computer user at home, in business and education.
 For many people, having access to this information is no longer
just an advantage; it is essential.
 Therefore, security of network is the main criteria here and
firewalls provide this security.
What is a Firewall?
 A Firewall is simply a program or hardware device that
filters the information coming through the internet
connection into your private network or computer system.
How it works???
 The protocol that computers use to communicate on
the internet is called ‘ TCP/IP ‘.
 Every computer on the internet has a unique internet
protocol (IP Address) and each computer has a series
of ‘ ports ‘ used to communicate with other
computers.
 Ex: HTTP (Web pages)- Port 80 FTP (file)- Port 21
What is an application firewall?
 An application firewall is a special firewall that is specifically
coded for the type of traffic it is inspecting.
 The most widely developed application firewall is the web
application firewall.
Hardware firewall vs Software firewall
 Hardware firewalls are integrated into the router that sits
between a computer and the Internet.
 Software firewalls are installed on individual servers. They
intercept each connection request and then determine whether the
request is valid or not.
History of Firewalls…
 Firewall technology first began to emerge in the late 1980s.
Internet was still a fairly new technology in terms of its global
usage and connectivity.
 In 1988 an employee at the NASA Ames Research Center in
California sent a memo by email to his colleagues that read, "We
are currently under attack from an Internet VIRUS!
History of Firewalls…
 The first paper published on firewall technology was in 1988,
when Jeff Mogul from Digital Equipment Corp. developed filter
systems know as packet filter firewalls.
 One of the largest internet security companies in the world
released the product to the public in 1997.
Design goals for a firewall
 The first design goal for a firewall is that collectively
the sum of all the network traffic from internal to
external must go through the firewall physically
cutting off all access to the local network except via
the firewall.
 The second design goal would be only authorized
traffic which is delineated by the local security policy
will be allowed to proceed.
 Finally the last design goal is that the firewall itself is
resistant to penetration inclusive is a solid trustworthy
system with a protected operating system.
Types of firewalls
 Packet-filtering Router
Packet-filtering Router
 Applies a set of rules to each incoming IP packet and then
forwards or discards the packet
 Filter packets going in both directions
 The packet filter is typically set up as a list of rules based on
matches to fields in the IP or TCP header
 Two default policies (discard or forward)
Types of firewalls…
 Application-level Gateway
Application-level Gateway
 Also called proxy server
 Acts as a relay of application-level traffic
Types of firewalls…
 Circuit-level Gateway
Circuit-level Gateway
 Stand-alone system or
 Specialized function performed by an Application-level
Gateway
 Sets up two TCP connections
 The gateway typically relays TCP segments from one
connection to the other without examining the contents
 The security function consists of determining which
connections will be allowed
The Role of Firewalls
 A firewall is a term used for a ``barrier'' between a network of
machines and users that operate under a common security policy
and generally trust each other, and the outside world.
 There are two basic reasons for using a firewall at present: to
save money in concentrating your security on a small number of
components, and to simplify the architecture of a system by
restricting access only to machines that trust each other.
What about Viruses???
 No, virus scanning is not the intended function of a
firewall. It only looks at header info or file type to
allow or block access.
 But some firewall comes with virus detecting
capability
 Firewalls are typically located at the boundary
between two networks.
Advantages of firewall
 Protocol filtering, where the firewall filters protocols and
services that are either not necessary or that cannot be
adequately secured from exploitation;
 Information hiding, in which a firewall can ``hide'' names of
internal systems or electronic mail addresses, thereby
revealing less information to outside hosts;
 Application gateways, where the firewall requires inside or
outside users to connect first to the firewall before
connecting further, thereby filtering the protocol;
Disadvantages of firewall
 The most obvious being that certain types of network access may
be hampered or even blocked for some hosts, including telnet,
ftp, X Windows, NFS, NIS, etc.
 A second disadvantage with a firewall system is that it
concentrates security in one spot as opposed to distributing it
among systems, thus a compromise of the firewall could be
disastrous to other less-protected systems on the subnet.
Conclusion
 One of the best things about a firewall from a security standpoint
is that it stops anyone on the outside from logging onto a
computer in your private network.
 While this is a big deal for businesses, most home networks will
probably not be threatened in this manner. Still, putting a firewall
in place provides some peace of mind.
References
 www.studymafia.org
 www.google.com
 www.wikipedia.com
Thanks..!!!

More Related Content

PPTX
Firewall security in computer network
PDF
FIREWALL
PPTX
Firewall presentation
PPTX
PDF
Firewall & types of Firewall
PPTX
Network security and viruses
PPTX
Firewall ( Cyber Security)
PPTX
Firewall presentation
Firewall security in computer network
FIREWALL
Firewall presentation
Firewall & types of Firewall
Network security and viruses
Firewall ( Cyber Security)
Firewall presentation

What's hot (20)

PDF
Network Security Fundamentals
PPTX
Security issues in manet
PPTX
Network security
PPTX
Network security
PDF
Secure your network - Segmentation and segregation
PPTX
Network security
PPTX
EDR(End Point Detection And Response).pptx
PPT
security in wireless sensor networks
PPTX
Intrusion detection
PPTX
Operating system security
PPTX
What is network security and Types
PPTX
Firewall and Types of firewall
PPTX
Firewall presentation
PPTX
Security in wireless sensor network
PPTX
Firewall basics
PPTX
Introduction of firewall slides
PPTX
Presentation on different modes of data communication
PPTX
Firewall in Network Security
PPT
firewall.ppt
Network Security Fundamentals
Security issues in manet
Network security
Network security
Secure your network - Segmentation and segregation
Network security
EDR(End Point Detection And Response).pptx
security in wireless sensor networks
Intrusion detection
Operating system security
What is network security and Types
Firewall and Types of firewall
Firewall presentation
Security in wireless sensor network
Firewall basics
Introduction of firewall slides
Presentation on different modes of data communication
Firewall in Network Security
firewall.ppt
Ad

Viewers also liked (9)

PPT
DOC
Firewall
 
PPT
Firewall
 
PPTX
Firewall
PPTX
Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)
PPTX
Data Value Creation in the Industrial IoT
PPT
Firewall Architecture
PPTX
firewall and its types
PDF
Tracxn Research — Industrial IoT Landscape, October 2016
Firewall
 
Firewall
 
Firewall
Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)
Data Value Creation in the Industrial IoT
Firewall Architecture
firewall and its types
Tracxn Research — Industrial IoT Landscape, October 2016
Ad

Similar to Firewall (20)

PDF
Firewall.pdf
PPTX
csefirewall in network.ppt-170825044521.pptx
PPTX
Firewall
PPTX
Firewall ppt
PPTX
Firewall ppt
PDF
Firewall
PPT
Firewall protection
PPTX
Firewall & packet filter new
PPTX
FIREWALLS BY SAIKIRAN PANJALA
DOC
PPT
PPTX
Firewall presentation
PPT
Firewall
PDF
firewall.pdf
DOCX
Firewalls
PDF
DOCX
Firewall configuration
Firewall.pdf
csefirewall in network.ppt-170825044521.pptx
Firewall
Firewall ppt
Firewall ppt
Firewall
Firewall protection
Firewall & packet filter new
FIREWALLS BY SAIKIRAN PANJALA
Firewall presentation
Firewall
firewall.pdf
Firewalls
Firewall configuration

More from reddivarihareesh (15)

PPTX
Network protocals
PPTX
PPTX
Java script
PPTX
J servlets
PPT
Internet of things
PPT
Hibernate
PPTX
PPTX
Google glass
PPTX
Filezilla
PPTX
Cashcading stylesheets
PPTX
Cluster computing
PPTX
Blue brain
PPTX
Artificial intelligence
PPTX
Network protocals
Java script
J servlets
Internet of things
Hibernate
Google glass
Filezilla
Cashcading stylesheets
Cluster computing
Blue brain
Artificial intelligence

Recently uploaded (20)

PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Hazard Identification & Risk Assessment .pdf
PDF
Trump Administration's workforce development strategy
PDF
IGGE1 Understanding the Self1234567891011
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
Complications of Minimal Access-Surgery.pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Paper A Mock Exam 9_ Attempt review.pdf.
History, Philosophy and sociology of education (1).pptx
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
AI-driven educational solutions for real-life interventions in the Philippine...
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Weekly quiz Compilation Jan -July 25.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
FORM 1 BIOLOGY MIND MAPS and their schemes
B.Sc. DS Unit 2 Software Engineering.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Unit 4 Computer Architecture Multicore Processor.pptx
Hazard Identification & Risk Assessment .pdf
Trump Administration's workforce development strategy
IGGE1 Understanding the Self1234567891011
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Complications of Minimal Access-Surgery.pdf
Cambridge-Practice-Tests-for-IELTS-12.docx

Firewall

  • 3. Contents  Introduction  What is a Firewall  How it works  Applications of Firewall  Software Firewall vs Hardware Firewall  History  Design goals for Firewall
  • 4. Contents…  Types  Role of Firewall  What about Viruses  Advantages  Disadvantages  Conclusion
  • 5. Introduction  The Internet has made large amount of information available to the average computer user at home, in business and education.  For many people, having access to this information is no longer just an advantage; it is essential.  Therefore, security of network is the main criteria here and firewalls provide this security.
  • 6. What is a Firewall?  A Firewall is simply a program or hardware device that filters the information coming through the internet connection into your private network or computer system.
  • 7. How it works???  The protocol that computers use to communicate on the internet is called ‘ TCP/IP ‘.  Every computer on the internet has a unique internet protocol (IP Address) and each computer has a series of ‘ ports ‘ used to communicate with other computers.  Ex: HTTP (Web pages)- Port 80 FTP (file)- Port 21
  • 8. What is an application firewall?  An application firewall is a special firewall that is specifically coded for the type of traffic it is inspecting.  The most widely developed application firewall is the web application firewall.
  • 9. Hardware firewall vs Software firewall  Hardware firewalls are integrated into the router that sits between a computer and the Internet.  Software firewalls are installed on individual servers. They intercept each connection request and then determine whether the request is valid or not.
  • 10. History of Firewalls…  Firewall technology first began to emerge in the late 1980s. Internet was still a fairly new technology in terms of its global usage and connectivity.  In 1988 an employee at the NASA Ames Research Center in California sent a memo by email to his colleagues that read, "We are currently under attack from an Internet VIRUS!
  • 11. History of Firewalls…  The first paper published on firewall technology was in 1988, when Jeff Mogul from Digital Equipment Corp. developed filter systems know as packet filter firewalls.  One of the largest internet security companies in the world released the product to the public in 1997.
  • 12. Design goals for a firewall  The first design goal for a firewall is that collectively the sum of all the network traffic from internal to external must go through the firewall physically cutting off all access to the local network except via the firewall.  The second design goal would be only authorized traffic which is delineated by the local security policy will be allowed to proceed.  Finally the last design goal is that the firewall itself is resistant to penetration inclusive is a solid trustworthy system with a protected operating system.
  • 13. Types of firewalls  Packet-filtering Router
  • 14. Packet-filtering Router  Applies a set of rules to each incoming IP packet and then forwards or discards the packet  Filter packets going in both directions  The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header  Two default policies (discard or forward)
  • 15. Types of firewalls…  Application-level Gateway
  • 16. Application-level Gateway  Also called proxy server  Acts as a relay of application-level traffic
  • 17. Types of firewalls…  Circuit-level Gateway
  • 18. Circuit-level Gateway  Stand-alone system or  Specialized function performed by an Application-level Gateway  Sets up two TCP connections  The gateway typically relays TCP segments from one connection to the other without examining the contents  The security function consists of determining which connections will be allowed
  • 19. The Role of Firewalls  A firewall is a term used for a ``barrier'' between a network of machines and users that operate under a common security policy and generally trust each other, and the outside world.  There are two basic reasons for using a firewall at present: to save money in concentrating your security on a small number of components, and to simplify the architecture of a system by restricting access only to machines that trust each other.
  • 20. What about Viruses???  No, virus scanning is not the intended function of a firewall. It only looks at header info or file type to allow or block access.  But some firewall comes with virus detecting capability  Firewalls are typically located at the boundary between two networks.
  • 21. Advantages of firewall  Protocol filtering, where the firewall filters protocols and services that are either not necessary or that cannot be adequately secured from exploitation;  Information hiding, in which a firewall can ``hide'' names of internal systems or electronic mail addresses, thereby revealing less information to outside hosts;  Application gateways, where the firewall requires inside or outside users to connect first to the firewall before connecting further, thereby filtering the protocol;
  • 22. Disadvantages of firewall  The most obvious being that certain types of network access may be hampered or even blocked for some hosts, including telnet, ftp, X Windows, NFS, NIS, etc.  A second disadvantage with a firewall system is that it concentrates security in one spot as opposed to distributing it among systems, thus a compromise of the firewall could be disastrous to other less-protected systems on the subnet.
  • 23. Conclusion  One of the best things about a firewall from a security standpoint is that it stops anyone on the outside from logging onto a computer in your private network.  While this is a big deal for businesses, most home networks will probably not be threatened in this manner. Still, putting a firewall in place provides some peace of mind.