3
Most read
4
Most read
5
Most read
Presentation :’Firewalls’Presenters :-Gagandeep SinghKarandeepVohraPuneetpal Singh1
Table of Contents2IntroductionHOW FIREWALL WORKSTypes of Firewalls MAKING THE FIREWALL FITTESTING A FIREWALL CONFIGURATIONCONCLUSIONREFERENCES
IntroductionIs hardware, software, or a combination of bothused to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer.3
Hardware vs. Software Firewalls4Hardware FirewallsProtect an entire networkImplemented on the router levelUsually more expensive, harder to configureSoftware FirewallsProtect a single computerUsually less expensive, easier to configure
How does a software firewall work?5Inspects each individual “packet” of data as it arrives at either side of the firewallDetermines whether it should be allowed to pass through or if it should be blocked
Firewall Rules6Allow – traffic that flows automatically because it has been deemedBlock – traffic that is blocked because it has been deemed dangerous to your computerAsk – asks the user whether or not the traffic is allowed to pass through
What Can a Firewall Do?Focus for security decisionsStop hackers from accessing your computerCan enforce security policyProtects your personal informationLimits your exposureBlocks “pop up” ads and certain cookiesCan log Internet activity efficientlyDetermines which programs can access the Internet7
What Can't a Firewall Do?Can't protect you against malicious insidersCan't protect you against connections that don't go through itCan't protect against completely new threatsCan't protect against viruses8
Types of Firewalls Packet Filtering FirewallApplication level GatewayCircuit level gateway9
Architectures for Firewall Single-Box Architecture10
Screened Host Architecture11
Making The Firewall FitIP addressDomain namesProtocolsPorts12
What It Protects You FromRemote login SMTP session hijacking Operating system bugs SpamE-mail bombs Source routing 13
Security Strategies implemented Default DenyProhibit all communication that is not expressly permittedDefault PermitPermit all communication that is not explicitly prohibitedLeast Privilegereduces the authorization level at which various actions are performedDefense in Depthsecurity approach whereby each system on the network is secured to the greatest possible degreeChoke Pointforces  attackers to use a narrow channel to bypass the network14
Testing a Firewall Configuration15A faster and easier method is available with the Linux firewall     implementation Allows you to manually generate tests
 Suppose our local network is 172.16.1.0
 And we allow only TCP connections Example16# ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0accepted# ipchains -C forward -p tcp -s 172.16.2.0 1025 -d 44.136.8.2 80 -i eth0denied# ipchains -C forward -p udp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0denied# ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 23 -i eth0denied                                       sourceDestinationWrongWrongWrong
REFRENCES17www.howstuffworks.com www.securityfocus.com www.firewall.com
18Conclusion

More Related Content

PPTX
Firewall and its types and function
PPTX
Types of firewall
PPTX
Firewall presentation
PPT
FireWall
PPTX
Introduction of firewall slides
PPT
firewall.ppt
PPTX
Firewall in Network Security
Firewall and its types and function
Types of firewall
Firewall presentation
FireWall
Introduction of firewall slides
firewall.ppt
Firewall in Network Security

What's hot (20)

PPTX
Firewall and Types of firewall
PPTX
Networking Devices
PPTX
Introduction to Network Security
PPTX
cloud storage ppt
PPTX
Key management
PPTX
Network Security
PPT
Network security
PPT
Firewall
PPTX
firewall and its types
PPTX
Network security
PPTX
Introduction to Network and System Administration
PPT
Firewall Security Definition
PPTX
Load balancing
PPTX
User authentication
 
PPTX
Firewall
PPTX
Presentation on computer networking
PPTX
Protection and security
PPTX
Kerberos
PPTX
Cryptography and Information Security
Firewall and Types of firewall
Networking Devices
Introduction to Network Security
cloud storage ppt
Key management
Network Security
Network security
Firewall
firewall and its types
Network security
Introduction to Network and System Administration
Firewall Security Definition
Load balancing
User authentication
 
Firewall
Presentation on computer networking
Protection and security
Kerberos
Cryptography and Information Security
Ad

Viewers also liked (16)

PPT
PPT
NetworkSecurity.ppt
PDF
Smart irrigation system using Internet Of Things
PDF
Topics in network security
PPTX
Cyber law In India: its need & importance
PPT
Cyber Law
PDF
Email Security Overview
PPT
Intruders
PPTX
Pgp pretty good privacy
PPTX
PPTX
S/MIME & E-mail Security (Network Security)
PPT
Secure Socket Layer
PPTX
Cloud security ppt
PPT
Network Security Threats and Solutions
DOCX
PPSX
Intrusion detection system
NetworkSecurity.ppt
Smart irrigation system using Internet Of Things
Topics in network security
Cyber law In India: its need & importance
Cyber Law
Email Security Overview
Intruders
Pgp pretty good privacy
S/MIME & E-mail Security (Network Security)
Secure Socket Layer
Cloud security ppt
Network Security Threats and Solutions
Intrusion detection system
Ad

Similar to Firewall presentation (20)

PPTX
Firewallpresentation 100826052003-phpapp02
PDF
Firewallpresentation 100826052003-phpapp02
PPTX
Linta
PPTX
Linta
PPTX
firewallpresentation-100826052003-phpapp02.pptx
PPTX
Firewallpresentation 100826052003-phpapp02(1)
PPTX
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
PPTX
fire walls
PPTX
Firewall.pptx in Information Security for Human and students ease
PPT
Unit II Chapter 6 firewalls.ppt
PPTX
Firewalls-Intro
PPTX
Firewall ppt
PPTX
PDF
Firewall girija ppt
PPT
Network Security Firewalls hELPFUL TT.ppt
PPT
Firewalls
PPTX
Firewall ppt
PPTX
Firewall
PPT
Introduction to firewalls
Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02
Linta
Linta
firewallpresentation-100826052003-phpapp02.pptx
Firewallpresentation 100826052003-phpapp02(1)
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
fire walls
Firewall.pptx in Information Security for Human and students ease
Unit II Chapter 6 firewalls.ppt
Firewalls-Intro
Firewall ppt
Firewall girija ppt
Network Security Firewalls hELPFUL TT.ppt
Firewalls
Firewall ppt
Firewall
Introduction to firewalls

More from Amandeep Kaur (20)

PPTX
Video/ Graphics cards
DOCX
Menu vb
PPTX
Menu pop up menu mdi form and playing audio in vb
PPT
Active x control
PPTX
Image contro, and format functions in vb
PPTX
Data base connectivity and flex grid in vb
PPTX
Toolbar, statusbar, coolbar in vb
PPTX
Richtextbox
PPTX
Treeview listview
PPTX
Progress bar
PPTX
Filehandling
DOC
PPT
Ppt of socket
PPT
Introduction to computer graphics
PPT
Introduction to computer graphics
PPT
Introduction to computer graphics
PPT
Internet
DOCX
Internet working
DOC
Report on browser war
DOC
Report of internet connections
Video/ Graphics cards
Menu vb
Menu pop up menu mdi form and playing audio in vb
Active x control
Image contro, and format functions in vb
Data base connectivity and flex grid in vb
Toolbar, statusbar, coolbar in vb
Richtextbox
Treeview listview
Progress bar
Filehandling
Ppt of socket
Introduction to computer graphics
Introduction to computer graphics
Introduction to computer graphics
Internet
Internet working
Report on browser war
Report of internet connections

Firewall presentation

  • 1. Presentation :’Firewalls’Presenters :-Gagandeep SinghKarandeepVohraPuneetpal Singh1
  • 2. Table of Contents2IntroductionHOW FIREWALL WORKSTypes of Firewalls MAKING THE FIREWALL FITTESTING A FIREWALL CONFIGURATIONCONCLUSIONREFERENCES
  • 3. IntroductionIs hardware, software, or a combination of bothused to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer.3
  • 4. Hardware vs. Software Firewalls4Hardware FirewallsProtect an entire networkImplemented on the router levelUsually more expensive, harder to configureSoftware FirewallsProtect a single computerUsually less expensive, easier to configure
  • 5. How does a software firewall work?5Inspects each individual “packet” of data as it arrives at either side of the firewallDetermines whether it should be allowed to pass through or if it should be blocked
  • 6. Firewall Rules6Allow – traffic that flows automatically because it has been deemedBlock – traffic that is blocked because it has been deemed dangerous to your computerAsk – asks the user whether or not the traffic is allowed to pass through
  • 7. What Can a Firewall Do?Focus for security decisionsStop hackers from accessing your computerCan enforce security policyProtects your personal informationLimits your exposureBlocks “pop up” ads and certain cookiesCan log Internet activity efficientlyDetermines which programs can access the Internet7
  • 8. What Can't a Firewall Do?Can't protect you against malicious insidersCan't protect you against connections that don't go through itCan't protect against completely new threatsCan't protect against viruses8
  • 9. Types of Firewalls Packet Filtering FirewallApplication level GatewayCircuit level gateway9
  • 10. Architectures for Firewall Single-Box Architecture10
  • 12. Making The Firewall FitIP addressDomain namesProtocolsPorts12
  • 13. What It Protects You FromRemote login SMTP session hijacking Operating system bugs SpamE-mail bombs Source routing 13
  • 14. Security Strategies implemented Default DenyProhibit all communication that is not expressly permittedDefault PermitPermit all communication that is not explicitly prohibitedLeast Privilegereduces the authorization level at which various actions are performedDefense in Depthsecurity approach whereby each system on the network is secured to the greatest possible degreeChoke Pointforces attackers to use a narrow channel to bypass the network14
  • 15. Testing a Firewall Configuration15A faster and easier method is available with the Linux firewall implementation Allows you to manually generate tests
  • 16. Suppose our local network is 172.16.1.0
  • 17. And we allow only TCP connections Example16# ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0accepted# ipchains -C forward -p tcp -s 172.16.2.0 1025 -d 44.136.8.2 80 -i eth0denied# ipchains -C forward -p udp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0denied# ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 23 -i eth0denied sourceDestinationWrongWrongWrong
  • 20. Testing a Firewall ConfigurationTHANKU19