SlideShare a Scribd company logo
2
Most read
5
Most read
19
Most read
www.oeclib.in
Submitted By:
Odisha Electronics Control Library
Content
 Introduction
 What is a Firewall
 Applications of Firewall
 Software Firewall vs Hardware Firewall
 History
 Design goals for Firewall
Content….
 Types
 Basic Concepts of Firewall
 Role of Firewall
 Advantages
 Disadvantages
 Conclusion
INTRODUCTION
 The Internet has made large amount of information available to
the average computer user at home, in business and education.
 For many people, having access to this information is no longer
just an advantage; it is essential.
 Therefore, security of network is the main criteria here and
firewalls provide this security.
What is a Firewall?
 A Firewall is simply a program or hardware device that
filters the information coming through the internet
connection into your private network or computer system.
What is an application firewall?
 An application firewall is a special firewall that is specifically
coded for the type of traffic it is inspecting.
 The most widely developed application firewall is the web
application firewall.
What is the difference between a host-based firewall
and a network-based firewall?
 A host-based firewall is installed on an individual computer to
protect it from activity occurring on its network.
 A network-based firewall is implemented at a specified point in
the network path and protects all computers on the “internal” side
of the firewall from all computers on the “external” side of the
firewall.
Hardware firewall vs Software firewall
 Hardware firewalls are integrated into the router that sits
between a computer and the Internet.
 Software firewalls are installed on individual servers. They
intercept each connection request and then determine whether the
request is valid or not.
History of Firewalls
 Firewall technology first began to emerge in the late 1980s.
Internet was still a fairly new technology in terms of its global
usage and connectivity.
 In 1988 an employee at the NASA Ames Research Center in
California sent a memo by email to his colleagues that read, "We
are currently under attack from an Internet VIRUS!
History of Firewalls…
 The first paper published on firewall technology was in 1988,
when Jeff Mogul from Digital Equipment Corp. developed filter
systems know as packet filter firewalls.
 One of the largest internet security companies in the world
released the product to the public in 1997.
Design goals for a firewall
 The first design goal for a firewall is that collectively
the sum of all the network traffic from internal to
external must go through the firewall physically
cutting off all access to the local network except via
the firewall.
 The second design goal would be only authorized
traffic which is delineated by the local security policy
will be allowed to proceed.
 Finally the last design goal is that the firewall itself is
resistant to penetration inclusive is a solid trustworthy
system with a protected operating system.
Types of firewalls
 Packet-filtering Router
Packet-filtering Router
 Applies a set of rules to each incoming IP packet and then
forwards or discards the packet
 Filter packets going in both directions
 The packet filter is typically set up as a list of rules based on
matches to fields in the IP or TCP header
 Two default policies (discard or forward)
Types of firewalls…
 Application-level Gateway
Application-level Gateway
 Also called proxy server
 Acts as a relay of application-level traffic
Types of firewalls…
 Circuit-level Gateway
Circuit-level Gateway
 Stand-alone system or
 Specialized function performed by an Application-level
Gateway
 Sets up two TCP connections
 The gateway typically relays TCP segments from one
connection to the other without examining the contents
 The security function consists of determining which
connections will be allowed
Basic concepts of a firewall
 Source
 Destination
 Service
 Action
The Role of Firewalls
 A firewall is a term used for a ``barrier'' between a network of
machines and users that operate under a common security policy
and generally trust each other, and the outside world.
 There are two basic reasons for using a firewall at present: to
save money in concentrating your security on a small number of
components, and to simplify the architecture of a system by
restricting access only to machines that trust each other.
Advantages of firewall
 Concentration of security all modified software and logging is
located on the firewall system as opposed to being distributed on
many hosts;
 Protocol filtering, where the firewall filters protocols and services
that are either not necessary or that cannot be adequately secured
from exploitation;
 Information hiding, in which a firewall can ``hide'' names of
internal systems or electronic mail addresses, thereby revealing
less information to outside hosts;
 Application gateways, where the firewall requires inside or
outside users to connect first to the firewall before connecting
further, thereby filtering the protocol;
Disadvantages of firewall
 The most obvious being that certain types of network access may
be hampered or even blocked for some hosts, including telnet,
ftp, X Windows, NFS, NIS, etc.
 A second disadvantage with a firewall system is that it
concentrates security in one spot as opposed to distributing it
among systems, thus a compromise of the firewall could be
disastrous to other less-protected systems on the subnet.
Conclusion
 One of the best things about a firewall from a security standpoint
is that it stops anyone on the outside from logging onto a
computer in your private network.
 While this is a big deal for businesses, most home networks will
probably not be threatened in this manner. Still, putting a firewall
in place provides some peace of mind.
References
 www.oeclib.in
 www.google.com
 www.wilipedia.com
Thanks..!!!

More Related Content

PPT
Computer Worms
PPTX
Introduction to IDS & IPS - Part 1
PPTX
Cyber security
PPTX
Five Major Types of Intrusion Detection System (IDS)
PDF
Forensics of a Windows System
PDF
Wireless Hacking
PPT
Port Scanning
PDF
Information Rights Management (IRM)
Computer Worms
Introduction to IDS & IPS - Part 1
Cyber security
Five Major Types of Intrusion Detection System (IDS)
Forensics of a Windows System
Wireless Hacking
Port Scanning
Information Rights Management (IRM)

What's hot (20)

PDF
He thong phat hien xam nhap IDS
PPTX
Intrusion detection system
PDF
Computer Security and Intrusion Detection(IDS/IPS)
PPTX
Viruses, worms, and trojan horses
PPTX
Computer forensic ppt
PDF
Snort IPS
PPT
Network security and protocols
ODP
Pen test methodology
PPTX
PROTOCOL MECHNISM FOR SECURITY ppt
PPTX
iOS Forensics
PPTX
DoS or DDoS attack
PPT
IoT security (Internet of Things)
PPTX
Network packet analysis -capture and Analysis
PPTX
Virus and worms
PDF
Malware analysis _ Threat Intelligence Morocco
PPTX
ioT_SDN
PPTX
Snort IDS/IPS Basics
PPT
Malware Incident Response
PDF
Luận văn: Hệ thống phát hiện xâm nhập mạng, HAY
PPTX
Directory Traversal & File Inclusion Attacks
He thong phat hien xam nhap IDS
Intrusion detection system
Computer Security and Intrusion Detection(IDS/IPS)
Viruses, worms, and trojan horses
Computer forensic ppt
Snort IPS
Network security and protocols
Pen test methodology
PROTOCOL MECHNISM FOR SECURITY ppt
iOS Forensics
DoS or DDoS attack
IoT security (Internet of Things)
Network packet analysis -capture and Analysis
Virus and worms
Malware analysis _ Threat Intelligence Morocco
ioT_SDN
Snort IDS/IPS Basics
Malware Incident Response
Luận văn: Hệ thống phát hiện xâm nhập mạng, HAY
Directory Traversal & File Inclusion Attacks
Ad

Similar to Firewall.pdf (20)

PPTX
csefirewall in network.ppt-170825044521.pptx
PPTX
PPTX
Firewall ppt
PPTX
Firewall ppt
PPT
Firewall protection
PPT
PDF
Firewall
PDF
firewall.pdf
PPTX
Firewall & packet filter new
PPTX
FIREWALLS BY SAIKIRAN PANJALA
DOC
PPT
Firewall
PDF
PPTX
Firewall ppt.pptx
PPTX
Firewall presentation
DOCX
PPTX
Firewalls
PPT
Firewall
 
csefirewall in network.ppt-170825044521.pptx
Firewall ppt
Firewall ppt
Firewall protection
Firewall
firewall.pdf
Firewall & packet filter new
FIREWALLS BY SAIKIRAN PANJALA
Firewall
Firewall ppt.pptx
Firewall presentation
Firewalls
Firewall
 
Ad

More from ImXaib (20)

PPTX
cellular-communication-system presentation.pptx
PPTX
informationandnetworksecurity16transpositionciphers-210723152730.pptx
PPTX
ALI HAMZAH PRESENTATION ON INFO SECURITY.pptx
PPTX
Advance Machine Learning presentation.pptx
PPTX
NEW METHODOLOGIES FOR IDENTIFYING CUSTOMER NEEDS FROM USER-GENERATED CONTENTS...
PPTX
ERD introduction in databases model.pptx
PPTX
SDA presentation the basics of computer science .pptx
PPTX
terminal a clear presentation on the topic.pptx
PPTX
What is Machine Learning_updated documents.pptx
PPTX
Grid Computing and it's applications.PPTX
PPT
4966709.ppt
PPT
lecture2.ppt
PPTX
Tools.pptx
PPT
lec3_10.ppt
PPT
ch12.ppt
PPT
Fullandparavirtualization.ppt
PPT
mis9_ch08_ppt.ppt
PPT
rooster-ipsecindepth.ppt
PPT
Policy formation and enforcement.ppt
PPT
Database schema architecture.ppt
cellular-communication-system presentation.pptx
informationandnetworksecurity16transpositionciphers-210723152730.pptx
ALI HAMZAH PRESENTATION ON INFO SECURITY.pptx
Advance Machine Learning presentation.pptx
NEW METHODOLOGIES FOR IDENTIFYING CUSTOMER NEEDS FROM USER-GENERATED CONTENTS...
ERD introduction in databases model.pptx
SDA presentation the basics of computer science .pptx
terminal a clear presentation on the topic.pptx
What is Machine Learning_updated documents.pptx
Grid Computing and it's applications.PPTX
4966709.ppt
lecture2.ppt
Tools.pptx
lec3_10.ppt
ch12.ppt
Fullandparavirtualization.ppt
mis9_ch08_ppt.ppt
rooster-ipsecindepth.ppt
Policy formation and enforcement.ppt
Database schema architecture.ppt

Recently uploaded (20)

PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Cell Structure & Organelles in detailed.
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Business Ethics Teaching Materials for college
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Institutional Correction lecture only . . .
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Cell Structure & Organelles in detailed.
Final Presentation General Medicine 03-08-2024.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Business Ethics Teaching Materials for college
Module 4: Burden of Disease Tutorial Slides S2 2025
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
TR - Agricultural Crops Production NC III.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Pharma ospi slides which help in ospi learning
STATICS OF THE RIGID BODIES Hibbelers.pdf
Microbial diseases, their pathogenesis and prophylaxis
Institutional Correction lecture only . . .
Abdominal Access Techniques with Prof. Dr. R K Mishra

Firewall.pdf

  • 2. Content  Introduction  What is a Firewall  Applications of Firewall  Software Firewall vs Hardware Firewall  History  Design goals for Firewall
  • 3. Content….  Types  Basic Concepts of Firewall  Role of Firewall  Advantages  Disadvantages  Conclusion
  • 4. INTRODUCTION  The Internet has made large amount of information available to the average computer user at home, in business and education.  For many people, having access to this information is no longer just an advantage; it is essential.  Therefore, security of network is the main criteria here and firewalls provide this security.
  • 5. What is a Firewall?  A Firewall is simply a program or hardware device that filters the information coming through the internet connection into your private network or computer system.
  • 6. What is an application firewall?  An application firewall is a special firewall that is specifically coded for the type of traffic it is inspecting.  The most widely developed application firewall is the web application firewall.
  • 7. What is the difference between a host-based firewall and a network-based firewall?  A host-based firewall is installed on an individual computer to protect it from activity occurring on its network.  A network-based firewall is implemented at a specified point in the network path and protects all computers on the “internal” side of the firewall from all computers on the “external” side of the firewall.
  • 8. Hardware firewall vs Software firewall  Hardware firewalls are integrated into the router that sits between a computer and the Internet.  Software firewalls are installed on individual servers. They intercept each connection request and then determine whether the request is valid or not.
  • 9. History of Firewalls  Firewall technology first began to emerge in the late 1980s. Internet was still a fairly new technology in terms of its global usage and connectivity.  In 1988 an employee at the NASA Ames Research Center in California sent a memo by email to his colleagues that read, "We are currently under attack from an Internet VIRUS!
  • 10. History of Firewalls…  The first paper published on firewall technology was in 1988, when Jeff Mogul from Digital Equipment Corp. developed filter systems know as packet filter firewalls.  One of the largest internet security companies in the world released the product to the public in 1997.
  • 11. Design goals for a firewall  The first design goal for a firewall is that collectively the sum of all the network traffic from internal to external must go through the firewall physically cutting off all access to the local network except via the firewall.  The second design goal would be only authorized traffic which is delineated by the local security policy will be allowed to proceed.  Finally the last design goal is that the firewall itself is resistant to penetration inclusive is a solid trustworthy system with a protected operating system.
  • 12. Types of firewalls  Packet-filtering Router
  • 13. Packet-filtering Router  Applies a set of rules to each incoming IP packet and then forwards or discards the packet  Filter packets going in both directions  The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header  Two default policies (discard or forward)
  • 14. Types of firewalls…  Application-level Gateway
  • 15. Application-level Gateway  Also called proxy server  Acts as a relay of application-level traffic
  • 16. Types of firewalls…  Circuit-level Gateway
  • 17. Circuit-level Gateway  Stand-alone system or  Specialized function performed by an Application-level Gateway  Sets up two TCP connections  The gateway typically relays TCP segments from one connection to the other without examining the contents  The security function consists of determining which connections will be allowed
  • 18. Basic concepts of a firewall  Source  Destination  Service  Action
  • 19. The Role of Firewalls  A firewall is a term used for a ``barrier'' between a network of machines and users that operate under a common security policy and generally trust each other, and the outside world.  There are two basic reasons for using a firewall at present: to save money in concentrating your security on a small number of components, and to simplify the architecture of a system by restricting access only to machines that trust each other.
  • 20. Advantages of firewall  Concentration of security all modified software and logging is located on the firewall system as opposed to being distributed on many hosts;  Protocol filtering, where the firewall filters protocols and services that are either not necessary or that cannot be adequately secured from exploitation;  Information hiding, in which a firewall can ``hide'' names of internal systems or electronic mail addresses, thereby revealing less information to outside hosts;  Application gateways, where the firewall requires inside or outside users to connect first to the firewall before connecting further, thereby filtering the protocol;
  • 21. Disadvantages of firewall  The most obvious being that certain types of network access may be hampered or even blocked for some hosts, including telnet, ftp, X Windows, NFS, NIS, etc.  A second disadvantage with a firewall system is that it concentrates security in one spot as opposed to distributing it among systems, thus a compromise of the firewall could be disastrous to other less-protected systems on the subnet.
  • 22. Conclusion  One of the best things about a firewall from a security standpoint is that it stops anyone on the outside from logging onto a computer in your private network.  While this is a big deal for businesses, most home networks will probably not be threatened in this manner. Still, putting a firewall in place provides some peace of mind.