PRESENTED BY -
Sathish P 1011-0986-2050
TOPICS TO BE DISCUSS ARE :
Introduction to Firewalls Firewall Architecture History of Firewalls Need of Firewalls Working of Firewalls Functions Advantages and Disadvantages Types of Firewalls Users of Firewalls
INTRODUCTION
A firewall is a piece of hardware or software program which protects a computer or network from attacks from intruders and hackers. A firewall is a set of related programs, located at a network gateway servers, that protects the resources of a private network from users from other networks.
Firewall Architecture
HISTORY
1st Generation :
The first network firewalls appeared in the late 1980s and were routers used to separate network into smaller LANs. The first security firewalls were used in the early 1990s. They were IP routers with filtering rules. These firewalls were effective, but limited. It was often very difficult to get the filtering rules right.
2nd Generation :
Todays firewalls are more reliable and has strong user authentication. It works on the concept of VPN (Virtual Private Network). They also include virus scanning, URL screening, and keyword scanners
3rd Generation :
In future there would be 3G firewalls with more enhanced features like virtual private networking (VPN), intrusion detection systems (IDSs), and virus scanning in more enhanced way.
NEED OF FIREWALLS
To protect for following: Loss and Manipulation of Data
Business Secrets and Confidential Data
Hijacked Networks Loss of Reputation
WORKING OF FIREWALLS
A firewall system contains a set of predefined rules that allow the system to: Authorize the connection (allow) Block the connection (deny) Reject the connection request without informing the issuer (drop)
FUNCTIONS
Blocking Incoming Traffic depending on Source. Blocking based on website Content. Allocates Internal Resources. Blocking Selected Outgoing Traffic. Make reports on all network traffic, network activity and so on. Checking the information in packets. Able to efficiently log inter-network activity, and limit the exposure of an organization.
SOFTWARE FIREWALL
HARDWARE FIREWALL
ADVANTAGES AND DISADVANTAGES
OF A SOFTWARE FIREWALL
Following are the advantages of software firewall : Free or cheap and easy to install Levels of access can be set
Following are the disadvantages of software firewall : May slow down applications May be heavy on system resources Can be difficult to remove
ADVANTAGES AND DISADVANTAGES
OF A HARDWARE FIREWALL
Following are the advantages of hardware firewall : More Secure Fast Following are the disadvantages of hardware firewall : Expensive to purchase Specialist knowledge may be required to install and configure Takes up physical space Hard to upgrade
TYPES OF FIREWALLS
Packet filtering firewalls Circuit level firewalls Application level firewalls Network level firewalls
PACKET
FILTERING
FIREWALLS
These firewalls work at the session layer of the OSI model, or TCP/IP layer of the TCP/IP. The packet filtering firewalls inspects packets to allow or deny them Traffic is filtered based on specified rules, including IP address , packet type, port number etc.
CIRCUIT
LEVEL FIREWALLS
These firewalls work at the session layer of the OSI model, or TCP/IP layer of the TCP/IP. Monitor TCP handshaking between packets to determine whether a requested session is legitimate. Useful for hiding information about protected networks
APPLICATION LEVEL FIREWALL
These are the software firewalls Often used by companies specifically to monitor and log employee activity to protect a home computer from hackers Filter packets at the application layer of OSI or TCP/IP model
STATEFUL MULTILAYER FIREWALL
combine the aspects of the other three types of firewalls.
FIREWALLS USED .
By:
Anyone who is responsible for a private network that is connected to a public network needs firewall protection. Anyone who connects so much as a single computer to the Internet via modem. For: It is generally used to prevent Internet users from gaining access to a private or corporate network. It can be used to control which Internet service are available to users of the corporate network on the other side of the firewall.