2. Contents
• Introduction
• History
• Why firewall security
• Types of firewalls
• Working
• Need for firewalls
• Next generation firewall
• Advantages and disadvantages
• Conclusion
3. Introduction
• A firewall is a network security system, either hardware- or
software-based, that controls incoming and outgoing network
traffic based on a set of rules.
• Network firewalls are frequently used to prevent
unauthorized Internet users from accessing private networks
connected to the Internet, especially intranets.
• All messages entering or leaving the intranet pass through
the firewall, which examines each message and blocks those
that do not meet the specified security criteria.
4. Continued…
• In protecting private information,
a firewall is considered a first line
of defense.
• In most server infrastructures,
firewalls provide an essential
layer of security that, combined
with other measures, prevent
attackers from accessing your
servers in malicious ways.
5. History
• Computer security borrowed the term firewall from
firefighting and fire prevention, where a firewall is a barrier
established to prevent the spread of fire.
• Before firewalls emerged in the late 1980s, the only real form
of network security was performed by access control lists
(ACLs) residing on routers.
• Firewall technology emerged in the late 1980s when the
Internet was a fairly new technology in terms of its global use
and connectivity.
6. Why firewall security..?
• Remote login
• Application backdoors
• SMTP session hijacking
• Operating system bugs
• Denial of service
• Viruses
8. Hardware firewall
• Hardware firewalls can be purchased as a stand-alone
product but are also typically found in broadband routers,
and should be considered an important part of your system
and network set-up.
• Most hardware firewalls will have a minimum of four network
ports to connect other computers, but for larger networks,
business networking firewall solutions are available.
9. Software firewall
• Software firewalls are installed on your computer (like any
software) and you can customize it; allowing you some
control over its function and protection features. A software
firewall will protect your computer from outside attempts to
control or gain access your computer.
• New generation Operating systems come with built in
firewalls or you can buy a firewall software for the computer
that accesses the internet or acts as the gateway to your
home network.
10.
11. Firewall logic
• Firewalls use 3 types of filtering mechanisms:
1. Packet filtering
2. Proxy service
3. Stateful inspection
12. Packet filtering
Data flow consists of packets of information and
firewalls analyze these packets to sniff out offensive or
unwanted packets depending on what you have defined
as unwanted packets.
Looks at each packet entering or leaving the network
and accepts or rejects it based on user-defined rules.
Packet filtering is fairly effective and transparent to
users, but it is difficult to configure.
14. Proxy service
A proxy server is a type of gateway that hides the true
network address of the computer(s) connecting through it.
A proxy server connects to the Internet, makes the requests
for pages, connections to servers, etc., and receives the data
on behalf of the computer(s) behind it.
The firewall capabilities lie in the fact that a proxy can be
configured to allow only certain types of traffic to pass
(e.g.,HTTP files, or web pages).
Proxy firewalls are considered to be the most secure type of
firewall because they prevent direct network contact with
other systems.
15. Firewall proxy servers works at the application layer of the
firewalls ,where both ends of a connection are forced to
conduct a session through the proxy.
16. Stateful inspection
A newer method that doesn't examine the contents of each
packet but instead compares certain key parts of the packet
to a database of trusted information.
Information traveling from inside the firewall to the outside is
monitored for specific defining characteristics, then incoming
information is compared to these characteristics.
If the comparison yields a reasonable match, the information
is allowed through. Otherwise it is discarded.
17. How do Firewalls protect Businesses
• Large corporations often have very complex
firewalls in place to protect their extensive
networks.
• On the outbound side, firewalls can be configured
to prevent employees from sending certain types of
emails or transmitting sensitive data outside of the
network.
• On the inbound side, firewalls can be programmed
to prevent access to certain websites (like social
networking sites).
• A company might choose to designate a single
computer on the network for file sharing and all
other computers could be restricted.
18. The need of Firewalls for Personal Use
• For home use, firewalls work much more simply.
• The main goal of a personal firewall is to protect your
personal computer and private network from malicious
mischief.
• Viruses are often the first type of malware that can be
transmitted to your computer through email or over the
Internet and can quickly cause a lot of damage to your
files. There are two ways a Firewall can prevent this
from happening.
• It can allow all traffic to pass through except data that
meets a predetermined set of criteria, or it can prohibit
all traffic unless it meets a predetermined set of criteria.
19.
20. Next generation firewalls
• Today, a new generation of users, applications, and
security threats are posing risk to the enterprise
wireless network.
• Traditional firewalls are not strong enough to
provide complete application visibility and control.
• Next Generation Firewalls allow organizations to
achieve network transparency, reduce
vulnerabilities, and conserve network performance.
21. Next generation firewalls
• A newer class of firewalls, next generation firewall -
NGFW, filters network and Internet traffic based
upon the applications or traffic types using specific
ports.
• Next Generation Firewalls (NGFWs) blend the
features of a standard firewall with quality of service
(QoS) functionalities in order to provide smarter and
deeper inspection.
22. Benefits of NGFW
• The 3 great benefits offered by next
generation firewall for your enterprise
wireless network are
1. Application Identification
2. Application Control
3. Threat Prevention
23. Advantages
• Low cost.
• Packet filters make use of current network routers.
• Makes Security Transparent to End-Users.
• Easy to install. High speed
• Packet filters make use of current network routers. Therefore
implementing a packet filter security system is typically less
complicated than other network security solutions.
• Packet filters are generally faster than other firewall
technologies because they perform fewer evaluations.
24. Disadvantages
• Packet filtering by a software firewall can degrade your system's
performance, because it's a demanding task to examine every
packet of data.
• Whichever option you choose, configuring and maintaining the
firewall can be a difficult
• A network firewall also can lend users a false sense of security,
encouraging them not to maintain security at the machine level. If
the network firewall fails or is not configured properly, this could
prove disastrous.
• Sometimes difficult to remove or un-install a firewall completely.
25.
26. Conclusion
• Firewalls are a must have for any kind of computer usage
that go online. They protect you from all kinds of abuse &
unauthorised access like trojans that allow taking control of
your computers by remote logins or backdoors, virus or use
your resources to launch DOS attacks.
• Firewalls are worth installing. Be it a basic standalone
system, a home network or a office network, all face varying
levels of risks & Firewalls do a good job in mitigating these
risks. Tune the firewall for your requirements & security
levels and you have one reason less to worry.