SlideShare une entreprise Scribd logo
1  sur  19
PRESENTERS :-
GAGANDEEP SINGH
KARANDEEP VOHRA
PUNEETPAL SINGH
Presentation :’Firewalls’
1
Table of Contents
2
 INTRODUCTION
 HOW FIREWALL WORKS
 TYPES OF FIREWALLS
 MAKING THE FIREWALL FIT
 TESTING A FIREWALL CONFIGURATION
 CONCLUSION
 REFERENCES
Introduction
 Is hardware, software, or a combination of both
 used to prevent unauthorized programs or Internet
users from accessing a private network and/or a
single computer.
3
Hardware vs. Software Firewalls
4
 Hardware Firewalls
 Protect an entire network
 Implemented on the router level
 Usually more expensive, harder to configure
 Software Firewalls
 Protect a single computer
 Usually less expensive, easier to configure
How does a software firewall work?
5
 Inspects each individual “packet” of data as it arrives
at either side of the firewall
 Determines whether it should be allowed to pass
through or if it should be blocked
Firewall Rules
6
 Allow – traffic that flows automatically because it
has been deemed
 Block – traffic that is blocked because it has been
deemed dangerous to your computer
 Ask – asks the user whether or not the traffic is
allowed to pass through
What Can a Firewall Do?
 Focus for security decisions
 Stop hackers from accessing your computer
 Can enforce security policy
 Protects your personal information
 Limits your exposure
 Blocks “pop up” ads and certain cookies
 Can log Internet activity efficiently
 Determines which programs can access the Internet
7
What Can't a Firewall Do?
 Can't protect you against malicious insiders
 Can't protect you against connections that don't go
through it
 Can't protect against completely new threats
 Can't protect against viruses
8
Types of Firewalls
 Packet Filtering Firewall
 Application level Gateway
 Circuit level gateway
9
Architectures for Firewall
 Single-Box Architecture
10
Screened Host Architecture
11
Making The Firewall Fit
 IP address
 Domain names
 Protocols
 Ports
12
What It Protects You From
 Remote login
 SMTP session hijacking
 Operating system bugs
 Spam
 E-mail bombs
 Source routing
13
Security Strategies implemented
 Default Deny
 Prohibit all communication that is not expressly permitted
 Default Permit
 Permit all communication that is not explicitly prohibited
 Least Privilege
 reduces the authorization level at which various actions are
performed
 Defense in Depth
 security approach whereby each system on the network is secured
to the greatest possible degree
 Choke Point
 forces attackers to use a narrow channel to bypass the network
14
Testing a Firewall Configuration
15
• A faster and easier method is available with the
Linux firewall
 implementation
• Allows you to manually generate tests
• Suppose our local network is 172.16.1.0
• And we allow only TCP connections
Example
16

# ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0
accepted
 # ipchains -C forward -p tcp -s 172.16.2.0 1025 -d 44.136.8.2 80 -i eth0
denied
 # ipchains -C forward -p udp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0
denied
 # ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 23 -i eth0
denied
source Destination
Wrong
Wrong
Wrong
REFRENCES
17
 www.howstuffworks.com
 www.securityfocus.com
 www.firewall.com
18
Conclusion
TESTING A FIREWALL CONFIGURATION
THANKU
19

Contenu connexe

Tendances

Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configurationSoban Ahmad
 
FireWall
FireWallFireWall
FireWallrubal_9
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security DefinitionPatten John
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentalsThang Man
 
Snort Intrusion Detection / Prevention System on PFSense Firewall
Snort Intrusion Detection / Prevention System  on PFSense FirewallSnort Intrusion Detection / Prevention System  on PFSense Firewall
Snort Intrusion Detection / Prevention System on PFSense FirewallHuda Seyam
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filtersMOHIT AGARWAL
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsüremin_oz
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer networkpoorvavyas4
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewallsSapna Kumari
 
Windows firewall
Windows firewallWindows firewall
Windows firewallVC Infotech
 

Tendances (19)

Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
FireWall
FireWallFireWall
FireWall
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
 
firewall
firewallfirewall
firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
 
Snort Intrusion Detection / Prevention System on PFSense Firewall
Snort Intrusion Detection / Prevention System  on PFSense FirewallSnort Intrusion Detection / Prevention System  on PFSense Firewall
Snort Intrusion Detection / Prevention System on PFSense Firewall
 
Firewall
FirewallFirewall
Firewall
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Firewall intro
Firewall introFirewall intro
Firewall intro
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 

En vedette

«Оставайтесь на линии...» или чем заняты менеджеры
«Оставайтесь на линии...» или чем заняты менеджеры«Оставайтесь на линии...» или чем заняты менеджеры
«Оставайтесь на линии...» или чем заняты менеджерыТелфин
 
Tejas Nandedkar Resume (1)
Tejas Nandedkar Resume (1)Tejas Nandedkar Resume (1)
Tejas Nandedkar Resume (1)Tejas Nandedkar
 
Instrumentación quirúrgica maga profe
Instrumentación quirúrgica maga profeInstrumentación quirúrgica maga profe
Instrumentación quirúrgica maga profeMagaly Ríos
 
запровадження програм розвитку життєвих навичок в школі
запровадження програм розвитку життєвих навичок в школі запровадження програм розвитку життєвих навичок в школі
запровадження програм розвитку життєвих навичок в школі Metodservice
 
Ch. 10 with jose ovu nov. 2015 sped 401
Ch. 10 with jose ovu nov. 2015 sped 401 Ch. 10 with jose ovu nov. 2015 sped 401
Ch. 10 with jose ovu nov. 2015 sped 401 isaacboles7
 
Tejas nandedkar resume (1)
Tejas nandedkar resume (1)Tejas nandedkar resume (1)
Tejas nandedkar resume (1)Tejas Nandedkar
 
idoling_approval_desire
idoling_approval_desireidoling_approval_desire
idoling_approval_desireShu (shoe116)
 
46584071 exercise-chapter-1-form-4 (1)
46584071 exercise-chapter-1-form-4 (1)46584071 exercise-chapter-1-form-4 (1)
46584071 exercise-chapter-1-form-4 (1)Monie Joey
 

En vedette (13)

KVR CV- 28 Oct 15
KVR CV- 28 Oct 15KVR CV- 28 Oct 15
KVR CV- 28 Oct 15
 
«Оставайтесь на линии...» или чем заняты менеджеры
«Оставайтесь на линии...» или чем заняты менеджеры«Оставайтесь на линии...» или чем заняты менеджеры
«Оставайтесь на линии...» или чем заняты менеджеры
 
Tejas Nandedkar Resume (1)
Tejas Nandedkar Resume (1)Tejas Nandedkar Resume (1)
Tejas Nandedkar Resume (1)
 
Instrumentación quirúrgica maga profe
Instrumentación quirúrgica maga profeInstrumentación quirúrgica maga profe
Instrumentación quirúrgica maga profe
 
JPCV
JPCVJPCV
JPCV
 
запровадження програм розвитку життєвих навичок в школі
запровадження програм розвитку життєвих навичок в школі запровадження програм розвитку життєвих навичок в школі
запровадження програм розвитку життєвих навичок в школі
 
Olimpo alvarez beltran 2
Olimpo alvarez beltran 2Olimpo alvarez beltran 2
Olimpo alvarez beltran 2
 
Ch. 10 with jose ovu nov. 2015 sped 401
Ch. 10 with jose ovu nov. 2015 sped 401 Ch. 10 with jose ovu nov. 2015 sped 401
Ch. 10 with jose ovu nov. 2015 sped 401
 
Caso Real
Caso RealCaso Real
Caso Real
 
Tejas nandedkar resume (1)
Tejas nandedkar resume (1)Tejas nandedkar resume (1)
Tejas nandedkar resume (1)
 
Mitología griega
Mitología griega Mitología griega
Mitología griega
 
idoling_approval_desire
idoling_approval_desireidoling_approval_desire
idoling_approval_desire
 
46584071 exercise-chapter-1-form-4 (1)
46584071 exercise-chapter-1-form-4 (1)46584071 exercise-chapter-1-form-4 (1)
46584071 exercise-chapter-1-form-4 (1)
 

Similaire à Firewallpresentation 100826052003-phpapp02

Similaire à Firewallpresentation 100826052003-phpapp02 (20)

Linta
LintaLinta
Linta
 
firewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptxfirewallpresentation-100826052003-phpapp02.pptx
firewallpresentation-100826052003-phpapp02.pptx
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
 
Firewall
FirewallFirewall
Firewall
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Firewalls-Intro
Firewalls-IntroFirewalls-Intro
Firewalls-Intro
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Net Defender
Net DefenderNet Defender
Net Defender
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Day4
Day4Day4
Day4
 

Dernier

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 

Dernier (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Firewallpresentation 100826052003-phpapp02

  • 1. PRESENTERS :- GAGANDEEP SINGH KARANDEEP VOHRA PUNEETPAL SINGH Presentation :’Firewalls’ 1
  • 2. Table of Contents 2  INTRODUCTION  HOW FIREWALL WORKS  TYPES OF FIREWALLS  MAKING THE FIREWALL FIT  TESTING A FIREWALL CONFIGURATION  CONCLUSION  REFERENCES
  • 3. Introduction  Is hardware, software, or a combination of both  used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. 3
  • 4. Hardware vs. Software Firewalls 4  Hardware Firewalls  Protect an entire network  Implemented on the router level  Usually more expensive, harder to configure  Software Firewalls  Protect a single computer  Usually less expensive, easier to configure
  • 5. How does a software firewall work? 5  Inspects each individual “packet” of data as it arrives at either side of the firewall  Determines whether it should be allowed to pass through or if it should be blocked
  • 6. Firewall Rules 6  Allow – traffic that flows automatically because it has been deemed  Block – traffic that is blocked because it has been deemed dangerous to your computer  Ask – asks the user whether or not the traffic is allowed to pass through
  • 7. What Can a Firewall Do?  Focus for security decisions  Stop hackers from accessing your computer  Can enforce security policy  Protects your personal information  Limits your exposure  Blocks “pop up” ads and certain cookies  Can log Internet activity efficiently  Determines which programs can access the Internet 7
  • 8. What Can't a Firewall Do?  Can't protect you against malicious insiders  Can't protect you against connections that don't go through it  Can't protect against completely new threats  Can't protect against viruses 8
  • 9. Types of Firewalls  Packet Filtering Firewall  Application level Gateway  Circuit level gateway 9
  • 10. Architectures for Firewall  Single-Box Architecture 10
  • 12. Making The Firewall Fit  IP address  Domain names  Protocols  Ports 12
  • 13. What It Protects You From  Remote login  SMTP session hijacking  Operating system bugs  Spam  E-mail bombs  Source routing 13
  • 14. Security Strategies implemented  Default Deny  Prohibit all communication that is not expressly permitted  Default Permit  Permit all communication that is not explicitly prohibited  Least Privilege  reduces the authorization level at which various actions are performed  Defense in Depth  security approach whereby each system on the network is secured to the greatest possible degree  Choke Point  forces attackers to use a narrow channel to bypass the network 14
  • 15. Testing a Firewall Configuration 15 • A faster and easier method is available with the Linux firewall  implementation • Allows you to manually generate tests • Suppose our local network is 172.16.1.0 • And we allow only TCP connections
  • 16. Example 16  # ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0 accepted  # ipchains -C forward -p tcp -s 172.16.2.0 1025 -d 44.136.8.2 80 -i eth0 denied  # ipchains -C forward -p udp -s 172.16.1.0 1025 -d 44.136.8.2 80 -i eth0 denied  # ipchains -C forward -p tcp -s 172.16.1.0 1025 -d 44.136.8.2 23 -i eth0 denied source Destination Wrong Wrong Wrong
  • 19. TESTING A FIREWALL CONFIGURATION THANKU 19