SlideShare a Scribd company logo
Preetha/ME-CSE/I
Firewall: Introduction to the past
• Idea came from construction industry in 19th
century.
– Structure of metal sheets in houses, flights etc were the first
physical firewall.
– Metal sheets protected from fire.
• In 1980’s
– Usage of internet was rapidly growing.
– Businesses established and implemented networks.
• Difficulties faced !
– Huge network data traffic.
– Allocating the different networks.
• Solutions !
– Procedure of firewall implemented in routers.
– Networks were controlled.
Preetha/ME-CSE/I
Firewall: People who made it
important.
– Clifford Stoll a US astronomer and computer expert, discovered that
German spies accessing his system.
After this incident US started to implement firewall security in the
government networks.
– Bill Cheswick the author of the famous security book “Firewalls and
Internet Security” set up a simple electronic jail to observe anattacker.
He devoted himself and brought a huge impact on awareness of
firewall and internet and network security.
– Robert Tappan Morris created Morris Worm which was the virus
that awakened all the network administrators and made them think of
the importance of firewall. The networks administrators weren’t
expecting anything like this. The worm spread around networks
around the world. 10% of the internet was infected.
Preetha/ME-CSE/I
FIREWALL
• A firewall is a system designed to prevent
unauthorized access to or from a network.
• Firewalls can be implemented in both hardware and
software, or a combination of both.
• Firewalls are frequently used to prevent unauthorized
internet users from accessing private networks
connected to the Internet
Preetha/ME-CSE/I
Design goals
• All traffic from inside to outside and vice versa, must
pass through the firewall.
• Only authorized traffic (defined by the local security
policy) will be allowed to pass.
• Firewall itself is immune to penetration.
Preetha/ME-CSE/I
Four general techniques
• Service control
– Determines the types of Internet services that can be
accessed, inbound or outbound.
• Direction control
– Determines the direction in which particular service
requests are allowed to flow through the firewall.
• User control
– Controls access to a service according to which user is
attempting to access it.
• Behavior control
– Controls how particular services are used (e.g. filter e-
mail).
Preetha/ME-CSE/I
Capabilities of firewall
• Act as single choke point that keeps
unauthorized users out of the protected
network.
• Provides a location for monitoring security-
related events.
• Can serve as the platform for IPSec.
Preetha/ME-CSE/I
Types of FirewallTypes of Firewall
• Types of Firewall:
–Packet-filtering routers
–Application-level gateways
–Circuit-level gateways
Preetha/ME-CSE/I
Packet-filtering router
• Simplest, fastest firewall component .
• Examine each IP packet (no context) and permit or
deny according to rules .
• The router is typically configured to filter packets
going in both directions.
• The packet filter is typically set up as a list of rules
based on matches to fields in the IP or TCP header.
• If there is no match , then default action is
taken(discard or forward).
Preetha/ME-CSE/I
Packet-Filtering router
Preetha/ME-CSE/I
• Advantages:
–Simplicity
–Transparency to users
–High speed
• Disadvantages:
–Difficulty of setting up packet filter rules
–Does not support advanced user
authentication schemes.
–Generally vulnerable to attacks.
Preetha/ME-CSE/I
Cont..
• Possible attacks
– IP address spoofing - is the creation of Internet
Protocol(IP) packets with a source IP address.
– Source routing attacks- an attacker could use
source routing to direct packets to bypass existing
security restrictions.
– Tiny fragment attacks-attacker uses IP
fragmentation option to create extremely small
fragments and force the TCP header information
into a separate packet fragment.
Preetha/ME-CSE/I
Stateful Packet Filters
• Also referred to as dynamic packet filtering.
• Stateful inspection is a firewall architecture that works at the
network layer.
• Unlike packet filtering, which examines a packet based on the
information in its header, Stateful inspection tracks each
connection traversing all interfaces of the firewall and makes
sure they are valid.
• filtering decisions are based not only on administrator-defined
rules (as in static packet filtering) but also on context that has
been established by prior packets that have passed through the
firewall.
• Better able to detect bogus packets.
Preetha/ME-CSE/I
Application Level Gateway (or Proxy)
– Also known as application proxy or application-level proxy
– An application gateway is an application program that runs
on a firewall system between two networks.
– The user connects the gateway using TCP/Ip application
and gateway asks the user for name of remote host to be
accessed.
– When user responds & provides a valid user ID &
authentication information , the gateway contacts the
application on the remote host and relays TCP segments
containing the application data between the 2 endpoints.
– Once connected, the proxy makes all packet-forwarding
decisions. Since all communication is conducted through
the proxy server, computers behind the firewall are
protected.
– Can control traffic at application level .
• Need separate proxies for each service
Preetha/ME-CSE/I
Cont..
• Advantages:
– Higher security than packet filters.
– Easy to log and audit all incoming traffic.
• Disadvantages:
– Additional processing overhead on each connection.
Preetha/ME-CSE/I
Circuit-level gateway
– Specialized function performed by an
Application-level Gateway for certain applications.
– Gateway set up two TCP connections:
• One between itself & TCP user on an inner host.
• One between itself & TCP user on an outer host.
– Once two connections are established , the
gateway typically relays TCP segments from one
connection to the other without examining the
contents.
Preetha/ME-CSE/I
Circuit-level gateway
Preetha/ME-CSE/I
Bastion host
–A system identified by the firewall
administrator as a critical strong point in the
network´s security.
Characteristics:
• The bastion host serves as a platform for an application-
level or circuit-level gateway.
• Only services considered by network admin are
installed on the bastion host.
Preetha/ME-CSE/I
Firewall ConfigurationsFirewall Configurations
• In addition to the use of simple configuration
of a single system (single packet filtering
router or single gateway), more complex
configurations are possible.
– Screened host firewall system (single-homed
bastion host)
– Screened host firewall system (dual-homed bastion
host)
– Screened-subnet firewall system.
Preetha/ME-CSE/I
Screened host firewall system (single-
homed bastion host)
• Firewall consists of two systems:
– A packet-filtering router.
– A bastion host.
• The router is configured so that
– For traffic from internet , only IP packets destined for
the bastion host are allowed in.
– For traffic from the internal network , only IP packets
from the bastion host are allowed out.
• The bastion host performs authentication and
proxy functions.
Preetha/ME-CSE/I
Screened host firewall system (single-
homed bastion host)
Preetha/ME-CSE/I
Screened host firewall, dual-homed
bastion configuration
–The packet-filtering router is not completely
compromised.
–Traffic between the Internet and other hosts
on the private network has to flow through
the bastion host.
Preetha/ME-CSE/I
Screened host firewall, dual-homed
bastion configuration
Preetha/ME-CSE/I
Screened subnet firewall
configuration
–Most secure configuration of the three.
–Two packet-filtering routers are used.
–Creation of an isolated sub-network.
• Which consist of simply the bastion host, may also
include one or more information servers and modems.
Preetha/ME-CSE/I
Screened subnet firewall configuration
Preetha/ME-CSE/I
• Advantages:
– Three levels of defense to prevent intruders.
– The outside router advertises only the existence
of the screened subnet to the Internet (internal
network is invisible to the Internet).
– The inside router advertises only the existence
of the screened sub-net to the internal network (
the systems on the inside cannot construct
direct routes to the internet).
Preetha/ME-CSE/I
Summary
–firewalls
–types of firewalls
• packet-filter, stateful inspection, application
proxy, circuit-level.
–Bastion host
–Firewall configurations
Preetha/ME-CSE/I

More Related Content

PPTX
Firewall presentation
PPTX
Firewall and its purpose
PPTX
Firewalls
PPT
PPTX
Firewall ( Cyber Security)
PPTX
PDF
FIREWALL
Firewall presentation
Firewall and its purpose
Firewalls
Firewall ( Cyber Security)
FIREWALL

What's hot (20)

PPTX
Firewall in Network Security
PDF
Network security - OSI Security Architecture
PDF
Computer Networks Lecture Notes
PPTX
OSI Security Architecture
PPTX
Types of firewall
PPT
Secure Socket Layer
PPTX
Congestion control
PPTX
Firewall and its types and function
PPTX
Wireless network security
PDF
Web Security
PPTX
Types of attacks
PPTX
Operating system security
PPT
TCP/IP Network ppt
PPT
Packet tracer
PPTX
Secure Socket Layer (SSL)
PPTX
Wlan architecture
PPT
PPTX
Intrusion detection
 
PPTX
System security
PDF
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Firewall in Network Security
Network security - OSI Security Architecture
Computer Networks Lecture Notes
OSI Security Architecture
Types of firewall
Secure Socket Layer
Congestion control
Firewall and its types and function
Wireless network security
Web Security
Types of attacks
Operating system security
TCP/IP Network ppt
Packet tracer
Secure Socket Layer (SSL)
Wlan architecture
Intrusion detection
 
System security
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Ad

Similar to Firewall & its configurations (20)

PPT
Presentation, Firewalls
PPTX
PPT
Presentation, Firewalls
PPT
firewall.ppt
PPT
Firewall protection
PDF
[9] Firewall.pdf
PPTX
Cyber Security - Firewall and Packet Filters
PPTX
Firewalls by Puneet Bawa
PPTX
PPT
Lecture 4 firewalls
PPTX
PPTX
csefirewall in network.ppt-170825044521.pptx
PPT
Tech 101: Understanding Firewalls
PPTX
Firewall
PPTX
Firewall Design and Implementation
PPTX
Firewall Design and Implementation
PDF
BAIT1103 Chapter 8
PPTX
Firewall
PPTX
Presentation, Firewalls
Presentation, Firewalls
firewall.ppt
Firewall protection
[9] Firewall.pdf
Cyber Security - Firewall and Packet Filters
Firewalls by Puneet Bawa
Lecture 4 firewalls
csefirewall in network.ppt-170825044521.pptx
Tech 101: Understanding Firewalls
Firewall
Firewall Design and Implementation
Firewall Design and Implementation
BAIT1103 Chapter 8
Firewall
Ad

Recently uploaded (20)

PPTX
Geodesy 1.pptx...............................................
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPT
Project quality management in manufacturing
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Lecture Notes Electrical Wiring System Components
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
Welding lecture in detail for understanding
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Sustainable Sites - Green Building Construction
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
additive manufacturing of ss316l using mig welding
Geodesy 1.pptx...............................................
CYBER-CRIMES AND SECURITY A guide to understanding
Operating System & Kernel Study Guide-1 - converted.pdf
Project quality management in manufacturing
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Lecture Notes Electrical Wiring System Components
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
CH1 Production IntroductoryConcepts.pptx
Structs to JSON How Go Powers REST APIs.pdf
Welding lecture in detail for understanding
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Sustainable Sites - Green Building Construction
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Lesson 3_Tessellation.pptx finite Mathematics
Foundation to blockchain - A guide to Blockchain Tech
additive manufacturing of ss316l using mig welding

Firewall & its configurations

  • 2. Firewall: Introduction to the past • Idea came from construction industry in 19th century. – Structure of metal sheets in houses, flights etc were the first physical firewall. – Metal sheets protected from fire. • In 1980’s – Usage of internet was rapidly growing. – Businesses established and implemented networks. • Difficulties faced ! – Huge network data traffic. – Allocating the different networks. • Solutions ! – Procedure of firewall implemented in routers. – Networks were controlled. Preetha/ME-CSE/I
  • 3. Firewall: People who made it important. – Clifford Stoll a US astronomer and computer expert, discovered that German spies accessing his system. After this incident US started to implement firewall security in the government networks. – Bill Cheswick the author of the famous security book “Firewalls and Internet Security” set up a simple electronic jail to observe anattacker. He devoted himself and brought a huge impact on awareness of firewall and internet and network security. – Robert Tappan Morris created Morris Worm which was the virus that awakened all the network administrators and made them think of the importance of firewall. The networks administrators weren’t expecting anything like this. The worm spread around networks around the world. 10% of the internet was infected. Preetha/ME-CSE/I
  • 4. FIREWALL • A firewall is a system designed to prevent unauthorized access to or from a network. • Firewalls can be implemented in both hardware and software, or a combination of both. • Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the Internet Preetha/ME-CSE/I
  • 5. Design goals • All traffic from inside to outside and vice versa, must pass through the firewall. • Only authorized traffic (defined by the local security policy) will be allowed to pass. • Firewall itself is immune to penetration. Preetha/ME-CSE/I
  • 6. Four general techniques • Service control – Determines the types of Internet services that can be accessed, inbound or outbound. • Direction control – Determines the direction in which particular service requests are allowed to flow through the firewall. • User control – Controls access to a service according to which user is attempting to access it. • Behavior control – Controls how particular services are used (e.g. filter e- mail). Preetha/ME-CSE/I
  • 7. Capabilities of firewall • Act as single choke point that keeps unauthorized users out of the protected network. • Provides a location for monitoring security- related events. • Can serve as the platform for IPSec. Preetha/ME-CSE/I
  • 8. Types of FirewallTypes of Firewall • Types of Firewall: –Packet-filtering routers –Application-level gateways –Circuit-level gateways Preetha/ME-CSE/I
  • 9. Packet-filtering router • Simplest, fastest firewall component . • Examine each IP packet (no context) and permit or deny according to rules . • The router is typically configured to filter packets going in both directions. • The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header. • If there is no match , then default action is taken(discard or forward). Preetha/ME-CSE/I
  • 11. • Advantages: –Simplicity –Transparency to users –High speed • Disadvantages: –Difficulty of setting up packet filter rules –Does not support advanced user authentication schemes. –Generally vulnerable to attacks. Preetha/ME-CSE/I
  • 12. Cont.. • Possible attacks – IP address spoofing - is the creation of Internet Protocol(IP) packets with a source IP address. – Source routing attacks- an attacker could use source routing to direct packets to bypass existing security restrictions. – Tiny fragment attacks-attacker uses IP fragmentation option to create extremely small fragments and force the TCP header information into a separate packet fragment. Preetha/ME-CSE/I
  • 13. Stateful Packet Filters • Also referred to as dynamic packet filtering. • Stateful inspection is a firewall architecture that works at the network layer. • Unlike packet filtering, which examines a packet based on the information in its header, Stateful inspection tracks each connection traversing all interfaces of the firewall and makes sure they are valid. • filtering decisions are based not only on administrator-defined rules (as in static packet filtering) but also on context that has been established by prior packets that have passed through the firewall. • Better able to detect bogus packets. Preetha/ME-CSE/I
  • 14. Application Level Gateway (or Proxy) – Also known as application proxy or application-level proxy – An application gateway is an application program that runs on a firewall system between two networks. – The user connects the gateway using TCP/Ip application and gateway asks the user for name of remote host to be accessed. – When user responds & provides a valid user ID & authentication information , the gateway contacts the application on the remote host and relays TCP segments containing the application data between the 2 endpoints. – Once connected, the proxy makes all packet-forwarding decisions. Since all communication is conducted through the proxy server, computers behind the firewall are protected. – Can control traffic at application level . • Need separate proxies for each service Preetha/ME-CSE/I
  • 15. Cont.. • Advantages: – Higher security than packet filters. – Easy to log and audit all incoming traffic. • Disadvantages: – Additional processing overhead on each connection. Preetha/ME-CSE/I
  • 16. Circuit-level gateway – Specialized function performed by an Application-level Gateway for certain applications. – Gateway set up two TCP connections: • One between itself & TCP user on an inner host. • One between itself & TCP user on an outer host. – Once two connections are established , the gateway typically relays TCP segments from one connection to the other without examining the contents. Preetha/ME-CSE/I
  • 18. Bastion host –A system identified by the firewall administrator as a critical strong point in the network´s security. Characteristics: • The bastion host serves as a platform for an application- level or circuit-level gateway. • Only services considered by network admin are installed on the bastion host. Preetha/ME-CSE/I
  • 19. Firewall ConfigurationsFirewall Configurations • In addition to the use of simple configuration of a single system (single packet filtering router or single gateway), more complex configurations are possible. – Screened host firewall system (single-homed bastion host) – Screened host firewall system (dual-homed bastion host) – Screened-subnet firewall system. Preetha/ME-CSE/I
  • 20. Screened host firewall system (single- homed bastion host) • Firewall consists of two systems: – A packet-filtering router. – A bastion host. • The router is configured so that – For traffic from internet , only IP packets destined for the bastion host are allowed in. – For traffic from the internal network , only IP packets from the bastion host are allowed out. • The bastion host performs authentication and proxy functions. Preetha/ME-CSE/I
  • 21. Screened host firewall system (single- homed bastion host) Preetha/ME-CSE/I
  • 22. Screened host firewall, dual-homed bastion configuration –The packet-filtering router is not completely compromised. –Traffic between the Internet and other hosts on the private network has to flow through the bastion host. Preetha/ME-CSE/I
  • 23. Screened host firewall, dual-homed bastion configuration Preetha/ME-CSE/I
  • 24. Screened subnet firewall configuration –Most secure configuration of the three. –Two packet-filtering routers are used. –Creation of an isolated sub-network. • Which consist of simply the bastion host, may also include one or more information servers and modems. Preetha/ME-CSE/I
  • 25. Screened subnet firewall configuration Preetha/ME-CSE/I
  • 26. • Advantages: – Three levels of defense to prevent intruders. – The outside router advertises only the existence of the screened subnet to the Internet (internal network is invisible to the Internet). – The inside router advertises only the existence of the screened sub-net to the internal network ( the systems on the inside cannot construct direct routes to the internet). Preetha/ME-CSE/I
  • 27. Summary –firewalls –types of firewalls • packet-filter, stateful inspection, application proxy, circuit-level. –Bastion host –Firewall configurations Preetha/ME-CSE/I