5
Most read
6
Most read
7
Most read
www.oeclib.in
Submitted By:
Odisha Electronics Control Library
Content
 Introduction
 What is a Firewall
 Applications of Firewall
 Software Firewall vs Hardware Firewall
 History
 Design goals for Firewall
Content….
 Types
 Basic Concepts of Firewall
 Role of Firewall
 Advantages
 Disadvantages
 Conclusion
INTRODUCTION
 The Internet has made large amount of information available to
the average computer user at home, in business and education.
 For many people, having access to this information is no longer
just an advantage; it is essential.
 Therefore, security of network is the main criteria here and
firewalls provide this security.
What is a Firewall?
 A Firewall is simply a program or hardware device that
filters the information coming through the internet
connection into your private network or computer system.
What is an application firewall?
 An application firewall is a special firewall that is specifically
coded for the type of traffic it is inspecting.
 The most widely developed application firewall is the web
application firewall.
What is the difference between a host-based firewall
and a network-based firewall?
 A host-based firewall is installed on an individual computer to
protect it from activity occurring on its network.
 A network-based firewall is implemented at a specified point in
the network path and protects all computers on the “internal” side
of the firewall from all computers on the “external” side of the
firewall.
Hardware firewall vs Software firewall
 Hardware firewalls are integrated into the router that sits
between a computer and the Internet.
 Software firewalls are installed on individual servers. They
intercept each connection request and then determine whether the
request is valid or not.
History of Firewalls
 Firewall technology first began to emerge in the late 1980s.
Internet was still a fairly new technology in terms of its global
usage and connectivity.
 In 1988 an employee at the NASA Ames Research Center in
California sent a memo by email to his colleagues that read, "We
are currently under attack from an Internet VIRUS!
History of Firewalls…
 The first paper published on firewall technology was in 1988,
when Jeff Mogul from Digital Equipment Corp. developed filter
systems know as packet filter firewalls.
 One of the largest internet security companies in the world
released the product to the public in 1997.
Design goals for a firewall
 The first design goal for a firewall is that collectively
the sum of all the network traffic from internal to
external must go through the firewall physically
cutting off all access to the local network except via
the firewall.
 The second design goal would be only authorized
traffic which is delineated by the local security policy
will be allowed to proceed.
 Finally the last design goal is that the firewall itself is
resistant to penetration inclusive is a solid trustworthy
system with a protected operating system.
Types of firewalls
 Packet-filtering Router
Packet-filtering Router
 Applies a set of rules to each incoming IP packet and then
forwards or discards the packet
 Filter packets going in both directions
 The packet filter is typically set up as a list of rules based on
matches to fields in the IP or TCP header
 Two default policies (discard or forward)
Types of firewalls…
 Application-level Gateway
Application-level Gateway
 Also called proxy server
 Acts as a relay of application-level traffic
Types of firewalls…
 Circuit-level Gateway
Circuit-level Gateway
 Stand-alone system or
 Specialized function performed by an Application-level
Gateway
 Sets up two TCP connections
 The gateway typically relays TCP segments from one
connection to the other without examining the contents
 The security function consists of determining which
connections will be allowed
Basic concepts of a firewall
 Source
 Destination
 Service
 Action
The Role of Firewalls
 A firewall is a term used for a ``barrier'' between a network of
machines and users that operate under a common security policy
and generally trust each other, and the outside world.
 There are two basic reasons for using a firewall at present: to
save money in concentrating your security on a small number of
components, and to simplify the architecture of a system by
restricting access only to machines that trust each other.
Advantages of firewall
 Concentration of security all modified software and logging is
located on the firewall system as opposed to being distributed on
many hosts;
 Protocol filtering, where the firewall filters protocols and services
that are either not necessary or that cannot be adequately secured
from exploitation;
 Information hiding, in which a firewall can ``hide'' names of
internal systems or electronic mail addresses, thereby revealing
less information to outside hosts;
 Application gateways, where the firewall requires inside or
outside users to connect first to the firewall before connecting
further, thereby filtering the protocol;
Disadvantages of firewall
 The most obvious being that certain types of network access may
be hampered or even blocked for some hosts, including telnet,
ftp, X Windows, NFS, NIS, etc.
 A second disadvantage with a firewall system is that it
concentrates security in one spot as opposed to distributing it
among systems, thus a compromise of the firewall could be
disastrous to other less-protected systems on the subnet.
Conclusion
 One of the best things about a firewall from a security standpoint
is that it stops anyone on the outside from logging onto a
computer in your private network.
 While this is a big deal for businesses, most home networks will
probably not be threatened in this manner. Still, putting a firewall
in place provides some peace of mind.
References
 www.oeclib.in
 www.google.com
 www.wilipedia.com
Thanks..!!!

More Related Content

PPTX
Firewall presentation
PPTX
Firewall and its types and function
PPTX
Types of firewall
PPS
Ip address
PPTX
Subnetting Presentation
PPTX
Cyber security
PPT
firewall.ppt
PPTX
Firewall in Network Security
Firewall presentation
Firewall and its types and function
Types of firewall
Ip address
Subnetting Presentation
Cyber security
firewall.ppt
Firewall in Network Security

What's hot (20)

PPTX
Networking Devices
PPT
Network security
PPTX
cloud storage ppt
PPTX
Characteristics of cloud computing
PPT
Firewall Security Definition
PPT
Network security cryptography ppt
PPTX
Introduction to Network Security
PPTX
Firewall and Types of firewall
PPTX
Network topology
PPTX
An introduction to networking
PPT
IDS and IPS
PDF
Web Security
PPTX
Virtualization in cloud computing
PPTX
IP Spoofing
PPTX
computer networks presentation
PPTX
Firewall
PPTX
Types of attacks
PPT
Trojan horse
Networking Devices
Network security
cloud storage ppt
Characteristics of cloud computing
Firewall Security Definition
Network security cryptography ppt
Introduction to Network Security
Firewall and Types of firewall
Network topology
An introduction to networking
IDS and IPS
Web Security
Virtualization in cloud computing
IP Spoofing
computer networks presentation
Firewall
Types of attacks
Trojan horse
Ad

Similar to Firewall ppt (20)

PPTX
_____________________________________firewall_ppt
PPTX
csefirewall in network.ppt-170825044521.pptx
PPTX
PPTX
Firewall ppt
PPTX
Firewall ppt
PPT
Firewall protection
PPT
PDF
Firewall
PDF
firewall.pdf
PPTX
Firewall & packet filter new
PPTX
FIREWALLS BY SAIKIRAN PANJALA
DOC
PPT
Firewall
PDF
PPTX
Firewall ppt.pptx
PPTX
Firewall presentation
PPTX
Firewalls
DOCX
_____________________________________firewall_ppt
csefirewall in network.ppt-170825044521.pptx
Firewall ppt
Firewall ppt
Firewall protection
Firewall
firewall.pdf
Firewall & packet filter new
FIREWALLS BY SAIKIRAN PANJALA
Firewall
Firewall ppt.pptx
Firewall presentation
Firewalls
Ad

More from OECLIB Odisha Electronics Control Library (20)

PPTX
PPTX
PPTX
PPTX
Agent Oriented Programming PPT
PPTX
Wireless application protocol ppt
PPTX
Wireless Communication ppt
PPTX
PPTX
Sixth sense technology ppt
PPTX
Software developement life cycle ppt
PPTX
Voice-over-Internet Protocol (VoIP) ppt
PPTX
Virtual Private Networks (VPN) ppt

Recently uploaded (20)

DOCX
KEY POINTS FOR CONTEPdkdrkrkkr. 7-9.docx
PDF
F311 CommSys_Lecture 02.pdffffffffffffff
PPTX
Nuclear_Power_Plant_Detailed_Presentation.pptx
PPTX
伦敦国王学院学历认证范本KCL成绩单激光标伦敦国王学院学费单成绩单
PPTX
IC Integrated circuits ppt for undergraduate course.pptx
DOCX
Workplace Transformation Market Outlook 2024–2031: Redefining the Future of Work
PPTX
How Internet Videos Changed Education
PPTX
Ways of Finding Calm In Everyday Life
PPTX
Quiz template 300 pages advanced and Tech friendly
PPT
Light utility vehicles 522024.ppt
PPTX
F&B 5th Semester exam Class Notes (2).pptx
PPTX
🛠️ Introduction to Industrial Arts.pptx
PPTX
Logic_Gates_With_Diagrams.pptx with exlaination
PDF
Research_on_Rail_Pressure_Control_of_High-Pressure.pdf
PPTX
photovoltic cell ppt solar panel installation
PPT
Access List. Configuration of Layer three Router Access List
PDF
Delhi c@lL girl$ in delhi cute girls with travel with family call now with cu...
PDF
Unit-IV Biochemical Techniqugvgvenjs.pdf
PPTX
Influenza jskss isksnz zjznsjdjd dxiejdj.pptx
DOC
咨询SBC毕业证学历认证,林顿伍德大学毕业证买大学文凭
KEY POINTS FOR CONTEPdkdrkrkkr. 7-9.docx
F311 CommSys_Lecture 02.pdffffffffffffff
Nuclear_Power_Plant_Detailed_Presentation.pptx
伦敦国王学院学历认证范本KCL成绩单激光标伦敦国王学院学费单成绩单
IC Integrated circuits ppt for undergraduate course.pptx
Workplace Transformation Market Outlook 2024–2031: Redefining the Future of Work
How Internet Videos Changed Education
Ways of Finding Calm In Everyday Life
Quiz template 300 pages advanced and Tech friendly
Light utility vehicles 522024.ppt
F&B 5th Semester exam Class Notes (2).pptx
🛠️ Introduction to Industrial Arts.pptx
Logic_Gates_With_Diagrams.pptx with exlaination
Research_on_Rail_Pressure_Control_of_High-Pressure.pdf
photovoltic cell ppt solar panel installation
Access List. Configuration of Layer three Router Access List
Delhi c@lL girl$ in delhi cute girls with travel with family call now with cu...
Unit-IV Biochemical Techniqugvgvenjs.pdf
Influenza jskss isksnz zjznsjdjd dxiejdj.pptx
咨询SBC毕业证学历认证,林顿伍德大学毕业证买大学文凭

Firewall ppt

  • 2. Content  Introduction  What is a Firewall  Applications of Firewall  Software Firewall vs Hardware Firewall  History  Design goals for Firewall
  • 3. Content….  Types  Basic Concepts of Firewall  Role of Firewall  Advantages  Disadvantages  Conclusion
  • 4. INTRODUCTION  The Internet has made large amount of information available to the average computer user at home, in business and education.  For many people, having access to this information is no longer just an advantage; it is essential.  Therefore, security of network is the main criteria here and firewalls provide this security.
  • 5. What is a Firewall?  A Firewall is simply a program or hardware device that filters the information coming through the internet connection into your private network or computer system.
  • 6. What is an application firewall?  An application firewall is a special firewall that is specifically coded for the type of traffic it is inspecting.  The most widely developed application firewall is the web application firewall.
  • 7. What is the difference between a host-based firewall and a network-based firewall?  A host-based firewall is installed on an individual computer to protect it from activity occurring on its network.  A network-based firewall is implemented at a specified point in the network path and protects all computers on the “internal” side of the firewall from all computers on the “external” side of the firewall.
  • 8. Hardware firewall vs Software firewall  Hardware firewalls are integrated into the router that sits between a computer and the Internet.  Software firewalls are installed on individual servers. They intercept each connection request and then determine whether the request is valid or not.
  • 9. History of Firewalls  Firewall technology first began to emerge in the late 1980s. Internet was still a fairly new technology in terms of its global usage and connectivity.  In 1988 an employee at the NASA Ames Research Center in California sent a memo by email to his colleagues that read, "We are currently under attack from an Internet VIRUS!
  • 10. History of Firewalls…  The first paper published on firewall technology was in 1988, when Jeff Mogul from Digital Equipment Corp. developed filter systems know as packet filter firewalls.  One of the largest internet security companies in the world released the product to the public in 1997.
  • 11. Design goals for a firewall  The first design goal for a firewall is that collectively the sum of all the network traffic from internal to external must go through the firewall physically cutting off all access to the local network except via the firewall.  The second design goal would be only authorized traffic which is delineated by the local security policy will be allowed to proceed.  Finally the last design goal is that the firewall itself is resistant to penetration inclusive is a solid trustworthy system with a protected operating system.
  • 12. Types of firewalls  Packet-filtering Router
  • 13. Packet-filtering Router  Applies a set of rules to each incoming IP packet and then forwards or discards the packet  Filter packets going in both directions  The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header  Two default policies (discard or forward)
  • 14. Types of firewalls…  Application-level Gateway
  • 15. Application-level Gateway  Also called proxy server  Acts as a relay of application-level traffic
  • 16. Types of firewalls…  Circuit-level Gateway
  • 17. Circuit-level Gateway  Stand-alone system or  Specialized function performed by an Application-level Gateway  Sets up two TCP connections  The gateway typically relays TCP segments from one connection to the other without examining the contents  The security function consists of determining which connections will be allowed
  • 18. Basic concepts of a firewall  Source  Destination  Service  Action
  • 19. The Role of Firewalls  A firewall is a term used for a ``barrier'' between a network of machines and users that operate under a common security policy and generally trust each other, and the outside world.  There are two basic reasons for using a firewall at present: to save money in concentrating your security on a small number of components, and to simplify the architecture of a system by restricting access only to machines that trust each other.
  • 20. Advantages of firewall  Concentration of security all modified software and logging is located on the firewall system as opposed to being distributed on many hosts;  Protocol filtering, where the firewall filters protocols and services that are either not necessary or that cannot be adequately secured from exploitation;  Information hiding, in which a firewall can ``hide'' names of internal systems or electronic mail addresses, thereby revealing less information to outside hosts;  Application gateways, where the firewall requires inside or outside users to connect first to the firewall before connecting further, thereby filtering the protocol;
  • 21. Disadvantages of firewall  The most obvious being that certain types of network access may be hampered or even blocked for some hosts, including telnet, ftp, X Windows, NFS, NIS, etc.  A second disadvantage with a firewall system is that it concentrates security in one spot as opposed to distributing it among systems, thus a compromise of the firewall could be disastrous to other less-protected systems on the subnet.
  • 22. Conclusion  One of the best things about a firewall from a security standpoint is that it stops anyone on the outside from logging onto a computer in your private network.  While this is a big deal for businesses, most home networks will probably not be threatened in this manner. Still, putting a firewall in place provides some peace of mind.