SlideShare a Scribd company logo
Firewalls
Presented By
Hareesh Pattipati
Outline
• Introduction
• Firewall Environments
• Type of Firewalls
• Future of Firewalls
• Conclusion
Introduction
• Firewalls control the flow of network traffic
• Firewalls have applicability in networks
where there is no internet connectivity
• Firewalls operate on number of layers
• Can also act as VPN gateways
• Active content filtering technologies
Firewall Environments
• There are different types of environments
where a firewall can be implemented.
• Simple environment can be a packet filter
firewall
• Complex environments can be several
firewalls and proxies
DMZ Environment
• Can be created out of a network connecting
two firewalls
• Boundary router filter packets protecting
server
• First firewall provide access control and
protection from server if they are hacked
DMZ ENV
VPN
• VPN is used to provide secure network
links across networks
• VPN is constructed on top of existing
network media and protocols
• On protocol level IPsec is the first choice
• Other protocols are PPTP, L2TP
VPN
Intranets
• An intranet is a network that employs the
same types of services, applications, and
protocols present in an Internet
implementation, without involving external
connectivity
• Intranets are typically implemented behind
firewall environments.
Intranets
Extranets
• Extranet is usually a business-to-business
intranet
• Controlled access to remote users via some
form of authentication and encryption such
as provided by a VPN
• Extranets employ TCP/IP protocols, along
with the same standard applications and
services
Type is Firewalls
• Firewalls fall into four broad categories
• Packet filters
• Circuit level
• Application level
• Stateful multilayer
Packet Filter
• Work at the network level of the OSI model
• Each packet is compared to a set of criteria
before it is forwarded
• Packet filtering firewalls is low cost and
low impact on network performance
Packet Filtering
Circuit level
• Circuit level gateways work at the session
layer of the OSI model, or the TCP layer of
TCP/IP
• Monitor TCP handshaking between packets
to determine whether a requested session is
legitimate.
Circuit Level
Application Level
• Application level gateways, also called
proxies, are similar to circuit-level gateways
except that they are application specific
• Gateway that is configured to be a web
proxy will not allow any ftp, gopher, telnet
or other traffic through
Application Level
Stateful Multilayer
• Stateful multilayer inspection firewalls
combine the aspects of the other three types
of firewalls
• They filter packets at the network layer,
determine whether session packets are
legitimate and evaluate contents of packets
at the application layer
Stateful Multilayer
General Performance
Future of Firewalls
• Firewalls will continue to advance as the attacks
on IT infrastructure become more and more
sophisticated
• More and more client and server applications are
coming with native support for proxied
environments
• Firewalls that scan for viruses as they enter the
network and several firms are currently exploring
this idea, but it is not yet in wide use
Conclusion
• It is clear that some form of security for
private networks connected to the Internet is
essential
• A firewall is an important and necessary
part of that security, but cannot be expected
to perform all the required security
functions.

More Related Content

PPT
Advance firewalls
PPT
Firewalls.ppt
PPT
Firewalls.ppt
PPT
Firewalls basic concepts and types22.ppt
PPT
Firewalls types and basic concepts22.ppt
PPTX
PPT
Unit 5.3_Firewalls (1).ppt
PPT
Firewalls
Advance firewalls
Firewalls.ppt
Firewalls.ppt
Firewalls basic concepts and types22.ppt
Firewalls types and basic concepts22.ppt
Unit 5.3_Firewalls (1).ppt
Firewalls

Similar to Firewalls presentation powerpoint powepoint (20)

PPT
Firewalls
PPTX
Firewall.pptx in Information Security for Human and students ease
PPT
Lecture in network security and mobile computing
PPTX
Lecture-13-Firewall_information_Security.pptx
PPTX
FIREWALLS BY SAIKIRAN PANJALA
PPTX
Firewall and Types of firewall
PPTX
PPT
PPT
Firewall protection
PPTX
firewall and its types
PPTX
firewall firewall firewall firewall firewall firewall firewall firewall
PPTX
FIREWALL
PDF
Network Security_Dr Shivashankar_Module 5.pdf
PPTX
Network defenses
PPTX
Firewall basics - types,architecture ,defination
PPT
Tech 101: Understanding Firewalls
PPT
Unit II Chapter 6 firewalls.ppt
PPTX
Section c group2_firewall_ final
PPTX
Firewall
PPTX
Firewall Design and Implementation
Firewalls
Firewall.pptx in Information Security for Human and students ease
Lecture in network security and mobile computing
Lecture-13-Firewall_information_Security.pptx
FIREWALLS BY SAIKIRAN PANJALA
Firewall and Types of firewall
Firewall protection
firewall and its types
firewall firewall firewall firewall firewall firewall firewall firewall
FIREWALL
Network Security_Dr Shivashankar_Module 5.pdf
Network defenses
Firewall basics - types,architecture ,defination
Tech 101: Understanding Firewalls
Unit II Chapter 6 firewalls.ppt
Section c group2_firewall_ final
Firewall
Firewall Design and Implementation
Ad

Recently uploaded (20)

PDF
The-Art-of-Storytelling-in-Cinema (1).pdf
PPTX
PLANT CELL description and characteristics
PPTX
Neoclassical and Mystery Plays Entertain
PPTX
Theatre Studies - Powerpoint Entertainmn
PPTX
WATER RESOURCE-1.pptx ssssdsedsddsssssss
PPTX
Lung Cancer - Bimbingan.pptxmnbmbnmnmn mn mn
PPTX
Nationalism in India Ch-2.pptx ssssss classs 10
PPTX
QA PROCESS FLOW CHART (1).pptxbbbbbbbbbnnnn
PPTX
level measurement foe tttttttttttttttttttttttttttttttttt
PDF
2025_Mohammad Mahbub KxXxáacscascsacabir.pdf
PDF
Mandala - the Indian dance history & science
PPTX
This is about the usage of color in universities design
PPTX
400kV_Switchyardasdsfesfewffwefrrwewew_Training_Module.pptx
PDF
Impressionism-in-Arts.For.Those.Who.Seek.Academic.Novelty.pdf
PPTX
Cloud Computing ppt.ppt1QU4FFIWEKWEIFRRGx
PDF
Landscape Architecture: Shaping the World Between Buildings
PDF
Music-and-Arts_jwkskwjsjsjsjsjsjsjdisiaiajsjjzjz
PDF
Arts and Crats of Cagayan and Central Luzon.pdf
PPTX
Lc 10hhjkhhjjkkkkjhhuiooopojjjoookjji.pptx
PPTX
philippine contemporary artscot ppt.pptx
The-Art-of-Storytelling-in-Cinema (1).pdf
PLANT CELL description and characteristics
Neoclassical and Mystery Plays Entertain
Theatre Studies - Powerpoint Entertainmn
WATER RESOURCE-1.pptx ssssdsedsddsssssss
Lung Cancer - Bimbingan.pptxmnbmbnmnmn mn mn
Nationalism in India Ch-2.pptx ssssss classs 10
QA PROCESS FLOW CHART (1).pptxbbbbbbbbbnnnn
level measurement foe tttttttttttttttttttttttttttttttttt
2025_Mohammad Mahbub KxXxáacscascsacabir.pdf
Mandala - the Indian dance history & science
This is about the usage of color in universities design
400kV_Switchyardasdsfesfewffwefrrwewew_Training_Module.pptx
Impressionism-in-Arts.For.Those.Who.Seek.Academic.Novelty.pdf
Cloud Computing ppt.ppt1QU4FFIWEKWEIFRRGx
Landscape Architecture: Shaping the World Between Buildings
Music-and-Arts_jwkskwjsjsjsjsjsjsjdisiaiajsjjzjz
Arts and Crats of Cagayan and Central Luzon.pdf
Lc 10hhjkhhjjkkkkjhhuiooopojjjoookjji.pptx
philippine contemporary artscot ppt.pptx
Ad

Firewalls presentation powerpoint powepoint

  • 2. Outline • Introduction • Firewall Environments • Type of Firewalls • Future of Firewalls • Conclusion
  • 3. Introduction • Firewalls control the flow of network traffic • Firewalls have applicability in networks where there is no internet connectivity • Firewalls operate on number of layers • Can also act as VPN gateways • Active content filtering technologies
  • 4. Firewall Environments • There are different types of environments where a firewall can be implemented. • Simple environment can be a packet filter firewall • Complex environments can be several firewalls and proxies
  • 5. DMZ Environment • Can be created out of a network connecting two firewalls • Boundary router filter packets protecting server • First firewall provide access control and protection from server if they are hacked
  • 7. VPN • VPN is used to provide secure network links across networks • VPN is constructed on top of existing network media and protocols • On protocol level IPsec is the first choice • Other protocols are PPTP, L2TP
  • 8. VPN
  • 9. Intranets • An intranet is a network that employs the same types of services, applications, and protocols present in an Internet implementation, without involving external connectivity • Intranets are typically implemented behind firewall environments.
  • 11. Extranets • Extranet is usually a business-to-business intranet • Controlled access to remote users via some form of authentication and encryption such as provided by a VPN • Extranets employ TCP/IP protocols, along with the same standard applications and services
  • 12. Type is Firewalls • Firewalls fall into four broad categories • Packet filters • Circuit level • Application level • Stateful multilayer
  • 13. Packet Filter • Work at the network level of the OSI model • Each packet is compared to a set of criteria before it is forwarded • Packet filtering firewalls is low cost and low impact on network performance
  • 15. Circuit level • Circuit level gateways work at the session layer of the OSI model, or the TCP layer of TCP/IP • Monitor TCP handshaking between packets to determine whether a requested session is legitimate.
  • 17. Application Level • Application level gateways, also called proxies, are similar to circuit-level gateways except that they are application specific • Gateway that is configured to be a web proxy will not allow any ftp, gopher, telnet or other traffic through
  • 19. Stateful Multilayer • Stateful multilayer inspection firewalls combine the aspects of the other three types of firewalls • They filter packets at the network layer, determine whether session packets are legitimate and evaluate contents of packets at the application layer
  • 22. Future of Firewalls • Firewalls will continue to advance as the attacks on IT infrastructure become more and more sophisticated • More and more client and server applications are coming with native support for proxied environments • Firewalls that scan for viruses as they enter the network and several firms are currently exploring this idea, but it is not yet in wide use
  • 23. Conclusion • It is clear that some form of security for private networks connected to the Internet is essential • A firewall is an important and necessary part of that security, but cannot be expected to perform all the required security functions.