SlideShare a Scribd company logo
Firewall & Proxy Server
Firewall
Firewall contd.
Firewall contd.
Definition

   A Firewall       protects networked computers from intentional hostile
   intrusion that could compromise confidentiality or result in data
   corruption or denial of service.


   A firewall sits at the junction point or gateway between the two
   networks, usually a private network and a public network such as the
   Internet.

   The earliest firewalls were simply routers.
Definition contd.

   A Firewall      is a device or set of devices designed to permit or deny
   network transmissions based upon a set of rules and is frequently used to
   protect networks from unauthorized access while permitting legitimate
   communications to pass.



   A Firewall        examines all traffic routed between the two networks to
   see if it meets certain criteria. If it does, it is routed between the
   networks, otherwise it is stopped.
Firewall Description

   There are two access denial methodologies used by firewalls. A firewall
   may allow all traffic through unless it meets certain criteria, or it may
   deny all traffic unless it meets certain criteria.

   Firewalls may be concerned with the type of traffic, or with source or
   destination addresses and ports.

   They may also use complex rule bases that analyze the application data
   to determine if the traffic should be allowed through.
Blocking Unknown Traffic
OSI & TCP/IP Model
  Firewalls operate at different layers to use different criteria to restrict
  traffic.
Professional Firewall

   If the intruder cannot get past level three, it is impossible to gain control
   of the operating system.

   Professional firewall products catch each network packet before the
   operating system does, thus, there is no direct path from the Internet to
   the operating system's TCP/IP stack.

   It is therefore very difficult for an intruder to gain control of the firewall
   host computer.
Firewall as Barrier
Packet Filtering Firewall
Packet Filtering Firewall contd.
   Packet filtering firewalls work at the network level of the OSI model, or
   the IP layer of TCP/IP.

   They are usually part of a router.

   A router is a device that receives packets from one network and
   forwards them to another network.

   In a packet filtering firewall each packet is compared to a set of criteria
   before it is forwarded.
Circuit Level
Circuit Level contd.
   Circuit level gateways work at the session layer of the OSI model, or the
   TCP layer of TCP/IP.

   They monitor TCP handshaking between packets to determine whether a
   requested session is legitimate.

   Applies security mechanisms when a TCP or UDP connection is
   established.

   Once the connection has been made, packets can flow between the hosts
   without further checking.
Application Layer Firewall
 Application level gateways, also called proxies, are similar to circuit-
 level gateways except that they are application specific. They can filter
 packets at the application layer of the OSI model.
Stateful Firewall
Stateful Multilayer

   Stateful multilayer inspection firewalls combine the aspects of the other
   three types of firewalls.

   This technology is generally referred to as a stateful packet inspection as
   it maintains records of all connections passing through the firewall

   This is able to determine whether a packet is the start of a new
   connection, a part of an existing connection, or is an invalid packet.
IP Spoofing

   A Technique used to gain unauthorized access to computers,
   whereby the intruder sends messages to a computer with an IP
   address indicating that the message is coming from a trusted host.

   To engage in IP spoofing, a hacker must first use a variety of techniques to find
   an IP address of a trusted host and then modify the packet headers so that it
   appears that the packets are coming from that host.

   IP address spoofing or IP spoofing refers to the creation of Internet
   Protocol (IP) packets with a forged source IP address, called spoofing, with the
   purpose of concealing the identity of the sender or impersonating another
   computing system.
Proxy Server
  A Proxy Server is a server (a computer system or an
  application) that acts as an intermediary for requests
  from clients seeking resources from other servers.

  A client connects to the proxy server, requesting some
  service, such as a file, connection, web page, or other
  resource, available from a different server.

  The proxy server evaluates the request according to its
  filtering rules.
Proxy Server contd.
Forward Proxy
Open Proxy
Reverse Proxy
Reference

  http://www.vicomsoft.com/learning-center/firewalls/

More Related Content

PPT
Web Proxy Server
PPT
Proxy Servers & Firewalls
PPT
Proxy server
PPTX
Firewall & Proxy Server
PPTX
Proxy Presentation
PPT
Firewall with proxy server.
PPT
Proxy servers
Web Proxy Server
Proxy Servers & Firewalls
Proxy server
Firewall & Proxy Server
Proxy Presentation
Firewall with proxy server.
Proxy servers

What's hot (20)

PPTX
Http Proxy Server
PPT
Proxy Servers
PPTX
Virtual Private Networks
PPT
Proxy Server
PPTX
Web proxy server
PPTX
Group18_Awesome4some:Proxy server.ppt
PPT
Proxy Servers
DOC
seminar on proxyserver
PPTX
Advantages of proxy server
PDF
Meeting 4 : proxy
PPTX
How a Proxy Server Works
PPS
Linux11 Proxy Server
DOCX
How to set up a proxy server on windows
PPT
Proxy server
PPT
Reverse proxy
PDF
PPT
Introduction to stable proxies.
PPTX
KILLME NOWITSELF
PDF
Web application & proxy server
PPTX
Virtual Private Network
Http Proxy Server
Proxy Servers
Virtual Private Networks
Proxy Server
Web proxy server
Group18_Awesome4some:Proxy server.ppt
Proxy Servers
seminar on proxyserver
Advantages of proxy server
Meeting 4 : proxy
How a Proxy Server Works
Linux11 Proxy Server
How to set up a proxy server on windows
Proxy server
Reverse proxy
Introduction to stable proxies.
KILLME NOWITSELF
Web application & proxy server
Virtual Private Network
Ad

Viewers also liked (17)

PDF
memcached proxy server development and operation
PPTX
Implementing transparent proxy server with acl
PPT
Concept & generation of computers
PDF
Computer Security and Intrusion Detection(IDS/IPS)
PDF
Ce hv6 module 54 proxy server technologies
PPTX
Five generations of computer
PPSX
Generations of computer
PPTX
Choosing A Proxy Server - Apachecon 2014
PDF
Generations of Computer
PPT
Classification and generations of computers
PPTX
Dhcp, dns and proxy server (1)
PDF
pfSense firewall workshop guide
PPTX
ETHICAL HACKING PPT
PPTX
Computer Generation Presentation
PPTX
GENERATIONS OF COMPUTER
PPSX
Computer generation
PPTX
GENERATION OF COMPUTERS.
memcached proxy server development and operation
Implementing transparent proxy server with acl
Concept & generation of computers
Computer Security and Intrusion Detection(IDS/IPS)
Ce hv6 module 54 proxy server technologies
Five generations of computer
Generations of computer
Choosing A Proxy Server - Apachecon 2014
Generations of Computer
Classification and generations of computers
Dhcp, dns and proxy server (1)
pfSense firewall workshop guide
ETHICAL HACKING PPT
Computer Generation Presentation
GENERATIONS OF COMPUTER
Computer generation
GENERATION OF COMPUTERS.
Ad

Similar to WT - Firewall & Proxy Server (20)

PPTX
Firewalls by Puneet Bawa
PPTX
firewall and its types
PPTX
Lec # 13 Firewall.pptx
PPTX
Firewall and Types of firewall
PPTX
Firewalls and packet filters
PPT
Chapter_Five[1].ppt
PPTX
Firewall and It's Types
DOCX
PDF
UNIT 4 Firewalls Information Security Sharad Institute
PPTX
Firewall
PPT
Firewall
PPTX
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
PPTX
CN. Presentation for submitting project term pptx
DOCX
Firewall configuration
PPTX
Firewall basics - types,architecture ,defination
PPT
Introduction to Firewalls and functions.ppt
PPT
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
DOC
Firewall
DOC
Firewall
Firewalls by Puneet Bawa
firewall and its types
Lec # 13 Firewall.pptx
Firewall and Types of firewall
Firewalls and packet filters
Chapter_Five[1].ppt
Firewall and It's Types
UNIT 4 Firewalls Information Security Sharad Institute
Firewall
Firewall
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
CN. Presentation for submitting project term pptx
Firewall configuration
Firewall basics - types,architecture ,defination
Introduction to Firewalls and functions.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Firewall
Firewall

More from vinay arora (20)

PDF
Search engine and web crawler
DOCX
Use case diagram (airport)
DOCX
Use case diagram
DOCX
Lab exercise questions (AD & CD)
PDF
SEM - UML (1st case study)
PPT
6 java - loop
PPT
4 java - decision
PPT
3 java - variable type
PPT
2 java - operators
PPT
1 java - data type
PPT
Uta005 lecture3
PPT
Uta005 lecture1
PPT
Uta005 lecture2
PPT
Security & Protection
PPT
Process Synchronization
PDF
CG - Output Primitives
PDF
CG - Display Devices
PDF
CG - Input Output Devices
PDF
CG - Introduction to Computer Graphics
PDF
C Prog. - Strings (Updated)
Search engine and web crawler
Use case diagram (airport)
Use case diagram
Lab exercise questions (AD & CD)
SEM - UML (1st case study)
6 java - loop
4 java - decision
3 java - variable type
2 java - operators
1 java - data type
Uta005 lecture3
Uta005 lecture1
Uta005 lecture2
Security & Protection
Process Synchronization
CG - Output Primitives
CG - Display Devices
CG - Input Output Devices
CG - Introduction to Computer Graphics
C Prog. - Strings (Updated)

Recently uploaded (20)

PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Business Ethics Teaching Materials for college
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Institutional Correction lecture only . . .
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Pre independence Education in Inndia.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Business Ethics Teaching Materials for college
Week 4 Term 3 Study Techniques revisited.pptx
VCE English Exam - Section C Student Revision Booklet
Basic Mud Logging Guide for educational purpose
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Institutional Correction lecture only . . .
Module 4: Burden of Disease Tutorial Slides S2 2025
Pre independence Education in Inndia.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Renaissance Architecture: A Journey from Faith to Humanism
2.FourierTransform-ShortQuestionswithAnswers.pdf
Pharma ospi slides which help in ospi learning
O5-L3 Freight Transport Ops (International) V1.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
01-Introduction-to-Information-Management.pdf
PPH.pptx obstetrics and gynecology in nursing
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF

WT - Firewall & Proxy Server

  • 5. Definition A Firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality or result in data corruption or denial of service. A firewall sits at the junction point or gateway between the two networks, usually a private network and a public network such as the Internet. The earliest firewalls were simply routers.
  • 6. Definition contd. A Firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. A Firewall examines all traffic routed between the two networks to see if it meets certain criteria. If it does, it is routed between the networks, otherwise it is stopped.
  • 7. Firewall Description There are two access denial methodologies used by firewalls. A firewall may allow all traffic through unless it meets certain criteria, or it may deny all traffic unless it meets certain criteria. Firewalls may be concerned with the type of traffic, or with source or destination addresses and ports. They may also use complex rule bases that analyze the application data to determine if the traffic should be allowed through.
  • 9. OSI & TCP/IP Model Firewalls operate at different layers to use different criteria to restrict traffic.
  • 10. Professional Firewall If the intruder cannot get past level three, it is impossible to gain control of the operating system. Professional firewall products catch each network packet before the operating system does, thus, there is no direct path from the Internet to the operating system's TCP/IP stack. It is therefore very difficult for an intruder to gain control of the firewall host computer.
  • 13. Packet Filtering Firewall contd. Packet filtering firewalls work at the network level of the OSI model, or the IP layer of TCP/IP. They are usually part of a router. A router is a device that receives packets from one network and forwards them to another network. In a packet filtering firewall each packet is compared to a set of criteria before it is forwarded.
  • 15. Circuit Level contd. Circuit level gateways work at the session layer of the OSI model, or the TCP layer of TCP/IP. They monitor TCP handshaking between packets to determine whether a requested session is legitimate. Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
  • 16. Application Layer Firewall Application level gateways, also called proxies, are similar to circuit- level gateways except that they are application specific. They can filter packets at the application layer of the OSI model.
  • 18. Stateful Multilayer Stateful multilayer inspection firewalls combine the aspects of the other three types of firewalls. This technology is generally referred to as a stateful packet inspection as it maintains records of all connections passing through the firewall This is able to determine whether a packet is the start of a new connection, a part of an existing connection, or is an invalid packet.
  • 19. IP Spoofing A Technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers so that it appears that the packets are coming from that host. IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system.
  • 20. Proxy Server A Proxy Server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules.