Firewall

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

FIREWALL SECURITY

BY ;
PRAMODH AND ADITYA.
ORIGIN OF FIREWALL :-
 ORIGINALLY REFFERED TO A “WALL” .

 CONSTRUCTED TO HALT SPREAD OF “FIRE”.

 WHAT IT ACTUALLY MEANS IN WORLD OF COMPUTER ?

 IT FORMS A “BARRIER”

 BETWEEEN A TRUSTED AND UNTRUSTED NETWORK .

 IT BLOCKS CERTAIN KINDS OF TRAFFIC .

 IT CAN BE A STAND ALONE MACHINE OR SOFTWARE IN A ROUTER OR SERVER


WHAT IS “FIREWALL SECURTIY” ?

 A firewall is a security policy enforcement point that regulates access between computer networks

 Filters are inherently insecure services

 Controls TCP protocols


http, smtp, ftp, telnet etc

 TCP:- “TRANSMISSION CONTROL PROTOCOL”

 ESTABLISHES AND MAINTAINS A NETWORK CONVERSATION.

 TOGETHER TCP AND IP ARE THE BASIC RULES FOR DEFINING THE INTERNET.
Who do Firewalls Guard Against?
 INTERNAL USERS

 HACKERS

 CORPORATE ESPIONAGE

 TERROISTS

 COMMON THIEVES
Common Internet Threats :-
 Denial of service attacks
Specific attacks that can cause a server crash
Flooding the server with traffic to disrupt or deny service

 Intrusion threats

 Attacks on services/exploits

 The backend server may not be hardened enough for adequate protection, but the firewall can block
external attacks

 Information threats

 “Viral” threats

 Defacement
TYPES OF FIREWALL SECURITY:-

1. PACKET FILTERING FIREWALL

2. STATEFUL FIREWALL

3. DEEP PACKET INSPECTION FIREWALL

4. APPLICATION-AWARE FIREWALL

5. APPLICATION PROXY FIREWALL


PACKET FILTERING FIREWALL:-
 IT IS A FIREWALL TECHNIQUES USED TO CONTROL NETWORK ACCESS.

 MONITORS OUTGOING AND INCOMING PACKETS.

 BY ALLOWING THEM TO PASS OR HALT BASE ON THE SOURCE.

 AND DESTINATION INTERNET PROTOCOL(IP) ADDRESSES PROTOCOLS AND PORTS.

 IT IS ALSO KNOWN AS STATIC FILTERING.


STATEFUL FIREWALL:-
 IT IS ALSO KNOWN AS “DYNAMIC PACKET FILTERING”

 IT IS A FIREWALL TECHNOLOGY THAT MONITORS THE STATE OF ACTIVE CONNECTIONS.

 AND USES THIS INFORMATION TO DETERMINE WHICH NETWORK PACKETS TO ALLOW THROUGH THE
FIREWALL

 IN STATIC PACKET FILTERING ONLY THE HEADERS OF PACKETS ARE CHECKED.

 WHICH MEANS THAT AN ATTACKER CAN SOMETIMES GET INFORMATION.

 BY SIMPLY INDICATING “REPLY” IN THE HEADER.


DEEP PACKET INSPECTION FIREWALL:-
 IT IS AN ADVANCED OF EXAMINING AND MANAGING NETWORK TRAFFIC.

 IT IS A FORM OF PACKET FILTERING THAT,


-> LOCATES
-> IDENTIFIES
-> CLASSIFIES
-> REROUTES
-> BLOCKS

 WITH SPECIFIC DATA OR CODE PAYLOADS


 THAT CONVETIONAL PACKET FILTERING.

 WHICH EXAMINES ONLY PACKET HEADERS.


APPLICATION –AWARE FIREWALL:-

 IT IS A FORM OF FIREWALL THAT CONTROLS


-> INPUT
->OUTPUT
->AND/OR ACCESS FROM
->TO
OR BY AN APPLICATION OR SERVICE

 THIS APPLICATION FIREWALL IS TYPICALLY


BUILT TO CONTROL ALL NETWORK TRAFFIC
ON ANYWAYS OSI LAYER UPTO THE APPLICATION
LAYER.
APPLICATION PROXY FIREWALL:-
 IT PROTECTS NETWORK RESOURCES BY FILTERING MESSAGES AT THE APPLICATION LAYER.

 IT IS ALSO CALLED AS AN APPLICATION LAYER OR GATEWAY FIREWALL.

 A PROXY FIREWALL ACTS AS AN INTERMEDIARY BETWEEN IN-HOUSE CLIENTS AND SERVERS ON THE
INTERNET

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy