SlideShare une entreprise Scribd logo
1  sur  27
Télécharger pour lire hors ligne
Firewalls
   The function of a strong position is to make
    the forces holding it practically unassailable
             -On War,(Carl Von Clausewitz)



                                       ABHIROOP GHATAK
                                       en no: 0771184406




29 December 2008       abhiroop@cdac                       1
What is a Firewall?
   A firewall is hardware, software, or a
    combination of both that is used to prevent
    unauthorized programs or Internet users from
    accessing a private network and/or a single
    computer.
   A firewall is simply a program or h/w device that
    filters the info.coming through the internet
    connection into your private network or
    comp-system.IF an incoming packet of info.is
    flagged by the filters,it is not allowed through.


29 December 2008         abhiroop@cdac                  2
Hardware vs. Software Firewalls

   Hardware Firewalls
        Protect an entire network
        Implemented on the router level
        Usually more expensive, harder to configure
   Software Firewalls
        Protect a single computer
        Usually less expensive, easier to configure




29 December 2008            abhiroop@cdac              3
How does a software firewall work?

   Inspects each individual “packet” of data as
    it arrives at either side of the firewall

   Inbound to or outbound from your computer

   Determines whether it should be allowed to
    pass through or if it should be blocked



29 December 2008       abhiroop@cdac               4
Firewalls denies or permits access based on
     rules and policies


                   Protected Private Network



                                                               Internet




29 December 2008                               abhiroop@cdac              5
Firewall Rules
   Allow – traffic that flows automatically
    because it has been deemed as “safe” (Ex.
    Meeting Maker, Eudora, etc.)

   Block – traffic that is blocked because it has
    been deemed dangerous to your computer

   Ask – asks the user whether or not the traffic
    is allowed to pass through

29 December 2008       abhiroop@cdac                 6
What a personal firewall can do

   Stop hackers from accessing your computer
   Protects your personal information
   Allow virtual private networks
   locks “pop up” ads and certain cookies
   Determines which programs can access the
    Internet




29 December 2008     abhiroop@cdac              7
Firewalls DON’T

   Protect against attacks that bypass the
    firewall
        Dial-out from internal host to an ISP
   Protect against internal threats
        disgruntled employee
        Insider cooperates with and external attacker
   Protect against the transfer of virus-infected
    programs or files

29 December 2008                 abhiroop@cdac           8
Type is Firewalls ..

Firewalls fall into four broad categories .

   Packet filters
   Application level
   Circuit level
   Stateful inspection firewalls




29 December 2008         abhiroop@cdac        9
Packet filtering firewall




29 December 2008   abhiroop@cdac   10
Packet Filtering Routers
           •       Forward or discard IP packet according a
                   set of rules
           •       Filtering rules are based on fields in the IP
                   and transport header




29 December 2008                    abhiroop@cdac                  11
Packet-filter firewall




29 December 2008           abhiroop@cdac   12
Application level gateway
   Proxy server
                             Firewall

                        Application Proxies

                     Application      Application

                     Transport         Transport
          Internal
          Network     Network           Network

                      Data Link        Data Link
                                                             Internet
                      Physical          Physical
                                                    Router




29 December 2008                  abhiroop@cdac                         13
Continue …
   Act as relay of application-level traffic.The
    user contacts the gateway using TCP/IP
    application,such as FTP ,and the gateway
    asks the user for the name of a remote host
    to be accessed.When the user responds and
    provides a valid user ID and authentication
    info. the gateway contacts the application on
    the remote host and relays TCP segments
    containing the application data between the
    two points.

29 December 2008       abhiroop@cdac                14
Proxy firewall




29 December 2008           abhiroop@cdac   15
Circuit level gateway(Firewall)

   Circuit level gateways work at the session layer of
    the OSI model.They monitor TCP handshaking
    between packets to determine whether a requested
    session is legitimate. Information passed to a
    remote computer through a circuit level gateway
    appears to have originated from the gateway. This is
    useful for hiding information about protected
    networks. Circuit level gateways are relatively
    inexpensive and have the advantage of hiding
    information about the private network they protect.
    On the other hand, they do not filter individual
    packets.

29 December 2008         abhiroop@cdac                 16
Circuit level gateway




29 December 2008   abhiroop@cdac   17
Continue ..
Whether a connection is valid may for examples be based upon:
 destination IP address and/or port
 source IP address and/or port
 time of day
 protocol
 user
 password


Every session of data exchange is validated and monitored and all
  traffic is disallowed unless a session is open.




29 December 2008             abhiroop@cdac                          18
Stateful inspection firewalls


                         Firewall/Router
                       Application - State Table

                       Transport - Access Rules

                      Network - Access Rules

                        Inspection Module
       Internal
       Network
                   Network                 Network
                   Data Link    Router    Data Link
                                                      Internet
                   Physical                Physical




29 December 2008                 abhiroop@cdac                   19
How to trust firewalls?

Firewalls can be trusted if they provide the
  following services
1)Authentication
2)access control
3)data confidentiality
4)data integrity
5)non repudiation




29 December 2008       abhiroop@cdac           20
uses of firewalls

   Virtual private network

   Demiltarised zone
   A DMZ can be viewed as a layer of privacy between the corporate
    infrastructure and the Internet, exposing only those systems that
    must be known to the public.

   Ip security



29 December 2008                abhiroop@cdac                           21
VPN




29 December 2008         abhiroop@cdac   22
De-militarised zone


            Protected private network

                                         Open access
                                           between
                                         private LAN
                                          and DMZ

                              Allow                           Internet
                              SMTP,
                            From here
                             to there
          WEB                  only
         Server
                            DMZ
                                            Static filters
          Mail                          between private LAN
         Server                          and DMZ used to
                                           control access
                   Demilitarised Zone

29 December 2008                          abhiroop@cdac                  23
Ip security

   Firewalls are needed when any organization
    relies heavily on the internet.




29 December 2008                 abhiroop@cdac   24
conclusion
   Firewall must continue to advance

   Firewalls must be developed to scan virus

   $377 million (approx.) lost till date
    due to network attacks
.


29 December 2008         abhiroop@cdac          25
29 December 2008   abhiroop@cdac   26
   For additional information visit
   http://www.pc-
    help.org/www.nwinternet.com/pchelp/security
    /firewalls.htm




29 December 2008      abhiroop@cdac           27

Contenu connexe

Tendances (19)

Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

En vedette

En vedette (19)

Client communication skills
Client communication skillsClient communication skills
Client communication skills
 
Client communication skills
Client communication skillsClient communication skills
Client communication skills
 
Communication skills to influence clients
Communication skills to influence clientsCommunication skills to influence clients
Communication skills to influence clients
 
Bioinformatics-General_Intro
Bioinformatics-General_IntroBioinformatics-General_Intro
Bioinformatics-General_Intro
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Abdul Hameed Final.doc
Abdul Hameed Final.docAbdul Hameed Final.doc
Abdul Hameed Final.doc
 
Developing Interactive Landslide Simulator (Report)
Developing Interactive Landslide Simulator (Report)Developing Interactive Landslide Simulator (Report)
Developing Interactive Landslide Simulator (Report)
 
JATTAN, Ashneel - Cert IV WHS pg1
JATTAN, Ashneel - Cert IV WHS pg1JATTAN, Ashneel - Cert IV WHS pg1
JATTAN, Ashneel - Cert IV WHS pg1
 
Abdul ghafoor
Abdul ghafoorAbdul ghafoor
Abdul ghafoor
 
Research paper_Anshul _Ankita_RSG
Research paper_Anshul _Ankita_RSGResearch paper_Anshul _Ankita_RSG
Research paper_Anshul _Ankita_RSG
 
CV Anoop
CV AnoopCV Anoop
CV Anoop
 
21bUc8YeDzZpE
21bUc8YeDzZpE21bUc8YeDzZpE
21bUc8YeDzZpE
 
Rec newsletter v1 issue 1 sep
Rec newsletter   v1 issue 1 sepRec newsletter   v1 issue 1 sep
Rec newsletter v1 issue 1 sep
 
Archit Profile
Archit ProfileArchit Profile
Archit Profile
 
Communication and transportation
Communication and transportationCommunication and transportation
Communication and transportation
 
Akarsh Raj BA
Akarsh Raj BAAkarsh Raj BA
Akarsh Raj BA
 
Resume Agrima Sahajpal
Resume Agrima SahajpalResume Agrima Sahajpal
Resume Agrima Sahajpal
 
Resume - Amogh
Resume - AmoghResume - Amogh
Resume - Amogh
 
flowchart resume
flowchart resumeflowchart resume
flowchart resume
 

Similaire à E firewalls

Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
E commerce & erp assignment | Firewall , Types of attack ,dmz, dhcp and ssl
E commerce & erp assignment | Firewall , Types of attack ,dmz, dhcp and sslE commerce & erp assignment | Firewall , Types of attack ,dmz, dhcp and ssl
E commerce & erp assignment | Firewall , Types of attack ,dmz, dhcp and sslShyamMohanKunwar
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWallwebhostingguy
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWallwebhostingguy
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALASaikiran Panjala
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network SecurityIRJET Journal
 
Firewall
FirewallFirewall
FirewallApo
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxssuserfb92ae
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ finalpg13tarun_g
 
IRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized UsersIRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized UsersIRJET Journal
 

Similaire à E firewalls (20)

Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewalls
FirewallsFirewalls
Firewalls
 
E commerce & erp assignment | Firewall , Types of attack ,dmz, dhcp and ssl
E commerce & erp assignment | Firewall , Types of attack ,dmz, dhcp and sslE commerce & erp assignment | Firewall , Types of attack ,dmz, dhcp and ssl
E commerce & erp assignment | Firewall , Types of attack ,dmz, dhcp and ssl
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Slied13
Slied13Slied13
Slied13
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
100197
100197100197
100197
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
Hacking3e ppt ch02
Hacking3e ppt ch02Hacking3e ppt ch02
Hacking3e ppt ch02
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Firewall
FirewallFirewall
Firewall
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
 
Section c group2_firewall_ final
Section c group2_firewall_ finalSection c group2_firewall_ final
Section c group2_firewall_ final
 
Divyanshu.pptx
Divyanshu.pptxDivyanshu.pptx
Divyanshu.pptx
 
IRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized UsersIRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized Users
 

Dernier

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Dernier (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

E firewalls

  • 1. Firewalls  The function of a strong position is to make the forces holding it practically unassailable -On War,(Carl Von Clausewitz) ABHIROOP GHATAK en no: 0771184406 29 December 2008 abhiroop@cdac 1
  • 2. What is a Firewall?  A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer.  A firewall is simply a program or h/w device that filters the info.coming through the internet connection into your private network or comp-system.IF an incoming packet of info.is flagged by the filters,it is not allowed through. 29 December 2008 abhiroop@cdac 2
  • 3. Hardware vs. Software Firewalls  Hardware Firewalls  Protect an entire network  Implemented on the router level  Usually more expensive, harder to configure  Software Firewalls  Protect a single computer  Usually less expensive, easier to configure 29 December 2008 abhiroop@cdac 3
  • 4. How does a software firewall work?  Inspects each individual “packet” of data as it arrives at either side of the firewall  Inbound to or outbound from your computer  Determines whether it should be allowed to pass through or if it should be blocked 29 December 2008 abhiroop@cdac 4
  • 5. Firewalls denies or permits access based on rules and policies Protected Private Network Internet 29 December 2008 abhiroop@cdac 5
  • 6. Firewall Rules  Allow – traffic that flows automatically because it has been deemed as “safe” (Ex. Meeting Maker, Eudora, etc.)  Block – traffic that is blocked because it has been deemed dangerous to your computer  Ask – asks the user whether or not the traffic is allowed to pass through 29 December 2008 abhiroop@cdac 6
  • 7. What a personal firewall can do  Stop hackers from accessing your computer  Protects your personal information  Allow virtual private networks  locks “pop up” ads and certain cookies  Determines which programs can access the Internet 29 December 2008 abhiroop@cdac 7
  • 8. Firewalls DON’T  Protect against attacks that bypass the firewall  Dial-out from internal host to an ISP  Protect against internal threats  disgruntled employee  Insider cooperates with and external attacker  Protect against the transfer of virus-infected programs or files 29 December 2008 abhiroop@cdac 8
  • 9. Type is Firewalls .. Firewalls fall into four broad categories .  Packet filters  Application level  Circuit level  Stateful inspection firewalls 29 December 2008 abhiroop@cdac 9
  • 10. Packet filtering firewall 29 December 2008 abhiroop@cdac 10
  • 11. Packet Filtering Routers • Forward or discard IP packet according a set of rules • Filtering rules are based on fields in the IP and transport header 29 December 2008 abhiroop@cdac 11
  • 12. Packet-filter firewall 29 December 2008 abhiroop@cdac 12
  • 13. Application level gateway  Proxy server Firewall Application Proxies Application Application Transport Transport Internal Network Network Network Data Link Data Link Internet Physical Physical Router 29 December 2008 abhiroop@cdac 13
  • 14. Continue …  Act as relay of application-level traffic.The user contacts the gateway using TCP/IP application,such as FTP ,and the gateway asks the user for the name of a remote host to be accessed.When the user responds and provides a valid user ID and authentication info. the gateway contacts the application on the remote host and relays TCP segments containing the application data between the two points. 29 December 2008 abhiroop@cdac 14
  • 15. Proxy firewall 29 December 2008 abhiroop@cdac 15
  • 16. Circuit level gateway(Firewall)  Circuit level gateways work at the session layer of the OSI model.They monitor TCP handshaking between packets to determine whether a requested session is legitimate. Information passed to a remote computer through a circuit level gateway appears to have originated from the gateway. This is useful for hiding information about protected networks. Circuit level gateways are relatively inexpensive and have the advantage of hiding information about the private network they protect. On the other hand, they do not filter individual packets. 29 December 2008 abhiroop@cdac 16
  • 17. Circuit level gateway 29 December 2008 abhiroop@cdac 17
  • 18. Continue .. Whether a connection is valid may for examples be based upon:  destination IP address and/or port  source IP address and/or port  time of day  protocol  user  password Every session of data exchange is validated and monitored and all traffic is disallowed unless a session is open. 29 December 2008 abhiroop@cdac 18
  • 19. Stateful inspection firewalls Firewall/Router Application - State Table Transport - Access Rules Network - Access Rules Inspection Module Internal Network Network Network Data Link Router Data Link Internet Physical Physical 29 December 2008 abhiroop@cdac 19
  • 20. How to trust firewalls? Firewalls can be trusted if they provide the following services 1)Authentication 2)access control 3)data confidentiality 4)data integrity 5)non repudiation 29 December 2008 abhiroop@cdac 20
  • 21. uses of firewalls  Virtual private network  Demiltarised zone  A DMZ can be viewed as a layer of privacy between the corporate infrastructure and the Internet, exposing only those systems that must be known to the public.  Ip security 29 December 2008 abhiroop@cdac 21
  • 22. VPN 29 December 2008 abhiroop@cdac 22
  • 23. De-militarised zone Protected private network Open access between private LAN and DMZ Allow Internet SMTP, From here to there WEB only Server DMZ Static filters Mail between private LAN Server and DMZ used to control access Demilitarised Zone 29 December 2008 abhiroop@cdac 23
  • 24. Ip security  Firewalls are needed when any organization relies heavily on the internet. 29 December 2008 abhiroop@cdac 24
  • 25. conclusion  Firewall must continue to advance  Firewalls must be developed to scan virus  $377 million (approx.) lost till date due to network attacks . 29 December 2008 abhiroop@cdac 25
  • 26. 29 December 2008 abhiroop@cdac 26
  • 27. For additional information visit  http://www.pc- help.org/www.nwinternet.com/pchelp/security /firewalls.htm 29 December 2008 abhiroop@cdac 27