SlideShare une entreprise Scribd logo
1  sur  15
FIREWALL
Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is FireWall ? ,[object Object],[object Object]
Software vs. Hardware Firewalls Software Firewall Hardware Firewall ,[object Object],[object Object],[object Object],[object Object],Norton Internet Security Cisco PIX Mcafee Internet Security NetScreen Outpost WatchGuard Ms. ISA Server Check Point
How does a Firewall work? ,[object Object],[object Object],[object Object],sent sent received received packets packets
How a firewall works ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LOG Alert Reset Fire Wall 
Types of FireWall Techniques ,[object Object],[object Object],[object Object],[object Object]
Packet filter - It looks at each packet  entering  or  leaving  the network and accepts or rejects it based on  user-defined rules . Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to  IP spoofing .  Packet Filtering Applications Presentations Sessions Transport DataLink Physical DataLink Physical Router Applications Presentations Sessions Transport DataLink Physical Network Network
Application gateway Application gateway (Proxy Server)-   User uses TCP/IP applications, such as  FTP  and  Telnet  servers. This is very effective, but can impose a performance degradation.  Applications Presentations Sessions Transport DataLink Physical Network DataLink Physical Applications Presentations Sessions Transport DataLink Physical Application Gateway Applications Presentations Sessions Transport Network Network Telnet HTTP FTP
Circuit-level gateway ,[object Object],[object Object],[object Object],[object Object]
Bastion host ,[object Object],[object Object]
Conclusion ,[object Object],[object Object]
What a personal firewall can do ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What a personal firewall cannot do ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Virus can jump Firewall !! F I R E W A L L Deadly Virus
SECURED Firewall Thank You…… Source – >CNS Text Book (William Stallings) > Wikipedia

Contenu connexe

Tendances

Firewall
FirewallFirewall
Firewall
Apo
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
rahul kundu
 

Tendances (20)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 

Similaire à FireWall

Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
mordannon
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
mordannon
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
webhostingguy
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
webhostingguy
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
Pranav Gontalwar
 

Similaire à FireWall (20)

INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewall
FirewallFirewall
Firewall
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall
FirewallFirewall
Firewall
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate Environment
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Firewall
FirewallFirewall
Firewall
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Placing backdoors-through-firewalls
Placing backdoors-through-firewallsPlacing backdoors-through-firewalls
Placing backdoors-through-firewalls
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall intro
Firewall introFirewall intro
Firewall intro
 
Firewalls
FirewallsFirewalls
Firewalls
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

FireWall

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Packet filter - It looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules . Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing . Packet Filtering Applications Presentations Sessions Transport DataLink Physical DataLink Physical Router Applications Presentations Sessions Transport DataLink Physical Network Network
  • 9. Application gateway Application gateway (Proxy Server)- User uses TCP/IP applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation. Applications Presentations Sessions Transport DataLink Physical Network DataLink Physical Applications Presentations Sessions Transport DataLink Physical Application Gateway Applications Presentations Sessions Transport Network Network Telnet HTTP FTP
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. SECURED Firewall Thank You…… Source – >CNS Text Book (William Stallings) > Wikipedia