SlideShare a Scribd company logo
www.studymafia.org
Content
 Introduction
 What is a Firewall
 Applications of Firewall
 Software Firewall vs Hardware Firewall
 History
 Design goals for Firewall
Content….
 Types
 Basic Concepts of Firewall
 Role of Firewall
 Advantages
 Disadvantages
 Conclusion
Introduction
 The Internet has made large amount of information available to
the average computer user at home, in business and education.
 For many people, having access to this information is no longer
just an advantage; it is essential.
 Therefore, security of network is the main criteria here and
firewalls provide this security.
What is a Firewall?
 A Firewall is simply a program or hardware device that
filters the information coming through the internet
connection into your private network or computer system.
What is an application firewall?
 An application firewall is a special firewall that is specifically
coded for the type of traffic it is inspecting.
 The most widely developed application firewall is the web
application firewall.
What is the difference between a host-based firewall
and a network-based firewall?
 A host-based firewall is installed on an individual computer to
protect it from activity occurring on its network.
 A network-based firewall is implemented at a specified point in
the network path and protects all computers on the “internal” side
of the firewall from all computers on the “external” side of the
firewall.
Hardware firewall vs Software firewall
 Hardware firewalls are integrated into the router that sits
between a computer and the Internet.
 Software firewalls are installed on individual servers. They
intercept each connection request and then determine whether the
request is valid or not.
History of Firewalls
 Firewall technology first began to emerge in the late 1980s.
Internet was still a fairly new technology in terms of its global
usage and connectivity.
 In 1988 an employee at the NASA Ames Research Center in
California sent a memo by email to his colleagues that read, "We
are currently under attack from an Internet VIRUS!
History of Firewalls…
 The first paper published on firewall technology was in 1988,
when Jeff Mogul from Digital Equipment Corp. developed filter
systems know as packet filter firewalls.
 One of the largest internet security companies in the world
released the product to the public in 1997.
Design goals for a firewall
 The first design goal for a firewall is that collectively
the sum of all the network traffic from internal to
external must go through the firewall physically
cutting off all access to the local network except via
the firewall.
 The second design goal would be only authorized
traffic which is delineated by the local security policy
will be allowed to proceed.
 Finally the last design goal is that the firewall itself is
resistant to penetration inclusive is a solid trustworthy
system with a protected operating system.
Types of firewalls
 Packet-filtering Router
Packet-filtering Router
 Applies a set of rules to each incoming IP packet and then
forwards or discards the packet
 Filter packets going in both directions
 The packet filter is typically set up as a list of rules based on
matches to fields in the IP or TCP header
 Two default policies (discard or forward)
Types of firewalls…
 Application-level Gateway
Application-level Gateway
 Also called proxy server
 Acts as a relay of application-level traffic
Types of firewalls…
 Circuit-level Gateway
Circuit-level Gateway
 Stand-alone system or
 Specialized function performed by an Application-level
Gateway
 Sets up two TCP connections
 The gateway typically relays TCP segments from one
connection to the other without examining the contents
 The security function consists of determining which
connections will be allowed
Basic concepts of a firewall
 Source
 Destination
 Service
 Action
The Role of Firewalls
 A firewall is a term used for a ``barrier'' between a network of
machines and users that operate under a common security policy
and generally trust each other, and the outside world.
 There are two basic reasons for using a firewall at present: to
save money in concentrating your security on a small number of
components, and to simplify the architecture of a system by
restricting access only to machines that trust each other.
Advantages of firewall
 Concentration of security all modified software and logging is
located on the firewall system as opposed to being distributed on
many hosts;
 Protocol filtering, where the firewall filters protocols and services
that are either not necessary or that cannot be adequately secured
from exploitation;
 Information hiding, in which a firewall can ``hide'' names of
internal systems or electronic mail addresses, thereby revealing
less information to outside hosts;
 Application gateways, where the firewall requires inside or
outside users to connect first to the firewall before connecting
further, thereby filtering the protocol;
Disadvantages of firewall
 The most obvious being that certain types of network access may
be hampered or even blocked for some hosts, including telnet,
ftp, X Windows, NFS, NIS, etc.
 A second disadvantage with a firewall system is that it
concentrates security in one spot as opposed to distributing it
among systems, thus a compromise of the firewall could be
disastrous to other less-protected systems on the subnet.
Conclusion
 One of the best things about a firewall from a security standpoint
is that it stops anyone on the outside from logging onto a
computer in your private network.
 While this is a big deal for businesses, most home networks will
probably not be threatened in this manner. Still, putting a firewall
in place provides some peace of mind.
Thanks..!!!

More Related Content

PPTX
Firewall presentation
PDF
Internet of Things - Privacy and Security issues
PPTX
Web 3.0 & IoT (English)
PDF
IoT security and privacy: main challenges and how ISOC-OTA address them
PPTX
Traditional Firewall vs. Next Generation Firewall
PPTX
Network security
PPT
Cloud security
PPTX
Firewall security in computer network
Firewall presentation
Internet of Things - Privacy and Security issues
Web 3.0 & IoT (English)
IoT security and privacy: main challenges and how ISOC-OTA address them
Traditional Firewall vs. Next Generation Firewall
Network security
Cloud security
Firewall security in computer network

What's hot (20)

PPTX
Network security
PPTX
Fundamentals of Network security
PPTX
Firewall DMZ Zone
PDF
Forcepoint Dynamic Data Protection
PDF
CloudOpen 2012 OpenNebula talk
PDF
Cybersecurity Roadmap Development for Executives
PPTX
Network security presentation
PPT
Next generation firewall(ngfw)feature and benefits
PPTX
palo-alto-networks-sase-overview-deck.pptx
PPT
Cyber Security in Bangladesh
PPTX
Firewall and Types of firewall
PPTX
Firewall
PPTX
Stuxnet mass weopan of cyber attack
PPTX
Social network privacy & security
PPTX
Cyber kill chain
PPTX
System Security-Chapter 1
PPTX
Cyber security
PDF
trellix-dlp-buyers-guide.pdf
PPTX
Chapter 06: cloud computing trends
Network security
Fundamentals of Network security
Firewall DMZ Zone
Forcepoint Dynamic Data Protection
CloudOpen 2012 OpenNebula talk
Cybersecurity Roadmap Development for Executives
Network security presentation
Next generation firewall(ngfw)feature and benefits
palo-alto-networks-sase-overview-deck.pptx
Cyber Security in Bangladesh
Firewall and Types of firewall
Firewall
Stuxnet mass weopan of cyber attack
Social network privacy & security
Cyber kill chain
System Security-Chapter 1
Cyber security
trellix-dlp-buyers-guide.pdf
Chapter 06: cloud computing trends
Ad

Similar to Firewall (20)

PPTX
csefirewall in network.ppt-170825044521.pptx
PPTX
PPTX
Firewall ppt
PPTX
Firewall ppt
PPT
Firewall protection
PPT
PDF
Firewall
PDF
firewall.pdf
PPTX
Firewall & packet filter new
DOC
PPT
Firewall
PPTX
FIREWALLS BY SAIKIRAN PANJALA
PDF
PPTX
Firewalls
PPTX
Firewall presentation
PPT
DOCX
PDF
internet-firewalls
csefirewall in network.ppt-170825044521.pptx
Firewall ppt
Firewall ppt
Firewall protection
Firewall
firewall.pdf
Firewall & packet filter new
Firewall
FIREWALLS BY SAIKIRAN PANJALA
Firewalls
Firewall presentation
internet-firewalls
Ad

More from Naga Dinesh (20)

PPTX
pi code (picture embedding)
PPTX
internet and intra net
PPTX
micro payments using coin
PPTX
Haptic technology
PPTX
eye phone technology
PPTX
Tera data
PPT
Selenium ppt
PPTX
pillcam
PPTX
team viewer
PPTX
Haptic tech
PPTX
Growth hacking
PPTX
PPTX
Anjular js
PPTX
brain chip
PPTX
35.digital jewellery
PPTX
mobilejammer
PPTX
29.skinput technology
PPT
5 g technology
PPTX
cloud storage ppt
PPTX
23.rainbowtechnology
pi code (picture embedding)
internet and intra net
micro payments using coin
Haptic technology
eye phone technology
Tera data
Selenium ppt
pillcam
team viewer
Haptic tech
Growth hacking
Anjular js
brain chip
35.digital jewellery
mobilejammer
29.skinput technology
5 g technology
cloud storage ppt
23.rainbowtechnology

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Modernizing your data center with Dell and AMD
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation theory and applications.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Electronic commerce courselecture one. Pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Big Data Technologies - Introduction.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Reach Out and Touch Someone: Haptics and Empathic Computing
Modernizing your data center with Dell and AMD
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
Encapsulation theory and applications.pdf
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Monthly Chronicles - July 2025
MYSQL Presentation for SQL database connectivity
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KodekX | Application Modernization Development
NewMind AI Weekly Chronicles - August'25 Week I
Electronic commerce courselecture one. Pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
“AI and Expert System Decision Support & Business Intelligence Systems”
Big Data Technologies - Introduction.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Firewall

  • 2. Content  Introduction  What is a Firewall  Applications of Firewall  Software Firewall vs Hardware Firewall  History  Design goals for Firewall
  • 3. Content….  Types  Basic Concepts of Firewall  Role of Firewall  Advantages  Disadvantages  Conclusion
  • 4. Introduction  The Internet has made large amount of information available to the average computer user at home, in business and education.  For many people, having access to this information is no longer just an advantage; it is essential.  Therefore, security of network is the main criteria here and firewalls provide this security.
  • 5. What is a Firewall?  A Firewall is simply a program or hardware device that filters the information coming through the internet connection into your private network or computer system.
  • 6. What is an application firewall?  An application firewall is a special firewall that is specifically coded for the type of traffic it is inspecting.  The most widely developed application firewall is the web application firewall.
  • 7. What is the difference between a host-based firewall and a network-based firewall?  A host-based firewall is installed on an individual computer to protect it from activity occurring on its network.  A network-based firewall is implemented at a specified point in the network path and protects all computers on the “internal” side of the firewall from all computers on the “external” side of the firewall.
  • 8. Hardware firewall vs Software firewall  Hardware firewalls are integrated into the router that sits between a computer and the Internet.  Software firewalls are installed on individual servers. They intercept each connection request and then determine whether the request is valid or not.
  • 9. History of Firewalls  Firewall technology first began to emerge in the late 1980s. Internet was still a fairly new technology in terms of its global usage and connectivity.  In 1988 an employee at the NASA Ames Research Center in California sent a memo by email to his colleagues that read, "We are currently under attack from an Internet VIRUS!
  • 10. History of Firewalls…  The first paper published on firewall technology was in 1988, when Jeff Mogul from Digital Equipment Corp. developed filter systems know as packet filter firewalls.  One of the largest internet security companies in the world released the product to the public in 1997.
  • 11. Design goals for a firewall  The first design goal for a firewall is that collectively the sum of all the network traffic from internal to external must go through the firewall physically cutting off all access to the local network except via the firewall.  The second design goal would be only authorized traffic which is delineated by the local security policy will be allowed to proceed.  Finally the last design goal is that the firewall itself is resistant to penetration inclusive is a solid trustworthy system with a protected operating system.
  • 12. Types of firewalls  Packet-filtering Router
  • 13. Packet-filtering Router  Applies a set of rules to each incoming IP packet and then forwards or discards the packet  Filter packets going in both directions  The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header  Two default policies (discard or forward)
  • 14. Types of firewalls…  Application-level Gateway
  • 15. Application-level Gateway  Also called proxy server  Acts as a relay of application-level traffic
  • 16. Types of firewalls…  Circuit-level Gateway
  • 17. Circuit-level Gateway  Stand-alone system or  Specialized function performed by an Application-level Gateway  Sets up two TCP connections  The gateway typically relays TCP segments from one connection to the other without examining the contents  The security function consists of determining which connections will be allowed
  • 18. Basic concepts of a firewall  Source  Destination  Service  Action
  • 19. The Role of Firewalls  A firewall is a term used for a ``barrier'' between a network of machines and users that operate under a common security policy and generally trust each other, and the outside world.  There are two basic reasons for using a firewall at present: to save money in concentrating your security on a small number of components, and to simplify the architecture of a system by restricting access only to machines that trust each other.
  • 20. Advantages of firewall  Concentration of security all modified software and logging is located on the firewall system as opposed to being distributed on many hosts;  Protocol filtering, where the firewall filters protocols and services that are either not necessary or that cannot be adequately secured from exploitation;  Information hiding, in which a firewall can ``hide'' names of internal systems or electronic mail addresses, thereby revealing less information to outside hosts;  Application gateways, where the firewall requires inside or outside users to connect first to the firewall before connecting further, thereby filtering the protocol;
  • 21. Disadvantages of firewall  The most obvious being that certain types of network access may be hampered or even blocked for some hosts, including telnet, ftp, X Windows, NFS, NIS, etc.  A second disadvantage with a firewall system is that it concentrates security in one spot as opposed to distributing it among systems, thus a compromise of the firewall could be disastrous to other less-protected systems on the subnet.
  • 22. Conclusion  One of the best things about a firewall from a security standpoint is that it stops anyone on the outside from logging onto a computer in your private network.  While this is a big deal for businesses, most home networks will probably not be threatened in this manner. Still, putting a firewall in place provides some peace of mind.