Sunteți pe pagina 1din 18

PRESENTED BY -

Sathish P 1011-0986-2050

TOPICS TO BE DISCUSS ARE :


Introduction to Firewalls Firewall Architecture History of Firewalls Need of Firewalls Working of Firewalls Functions Advantages and Disadvantages Types of Firewalls Users of Firewalls

INTRODUCTION

A firewall is a piece of hardware or software program which protects a computer or network from attacks from intruders and hackers. A firewall is a set of related programs, located at a network gateway servers, that protects the resources of a private network from users from other networks.

Firewall Architecture

HISTORY
1st Generation :
The first network firewalls appeared in the late 1980s and were routers used to separate network into smaller LANs. The first security firewalls were used in the early 1990s. They were IP routers with filtering rules. These firewalls were effective, but limited. It was often very difficult to get the filtering rules right.

2nd Generation :
Todays firewalls are more reliable and has strong user authentication. It works on the concept of VPN (Virtual Private Network). They also include virus scanning, URL screening, and keyword scanners

3rd Generation :
In future there would be 3G firewalls with more enhanced features like virtual private networking (VPN), intrusion detection systems (IDSs), and virus scanning in more enhanced way.

NEED OF FIREWALLS
To protect for following: Loss and Manipulation of Data

Business Secrets and Confidential Data


Hijacked Networks Loss of Reputation

WORKING OF FIREWALLS
A firewall system contains a set of predefined rules that allow the system to: Authorize the connection (allow) Block the connection (deny) Reject the connection request without informing the issuer (drop)

FUNCTIONS
Blocking Incoming Traffic depending on Source. Blocking based on website Content. Allocates Internal Resources. Blocking Selected Outgoing Traffic. Make reports on all network traffic, network activity and so on. Checking the information in packets. Able to efficiently log inter-network activity, and limit the exposure of an organization.

SOFTWARE FIREWALL

HARDWARE FIREWALL

ADVANTAGES AND DISADVANTAGES


OF A SOFTWARE FIREWALL
Following are the advantages of software firewall : Free or cheap and easy to install Levels of access can be set

Following are the disadvantages of software firewall : May slow down applications May be heavy on system resources Can be difficult to remove

ADVANTAGES AND DISADVANTAGES


OF A HARDWARE FIREWALL
Following are the advantages of hardware firewall : More Secure Fast Following are the disadvantages of hardware firewall : Expensive to purchase Specialist knowledge may be required to install and configure Takes up physical space Hard to upgrade

TYPES OF FIREWALLS

Packet filtering firewalls Circuit level firewalls Application level firewalls Network level firewalls

PACKET

FILTERING

FIREWALLS

These firewalls work at the session layer of the OSI model, or TCP/IP layer of the TCP/IP. The packet filtering firewalls inspects packets to allow or deny them Traffic is filtered based on specified rules, including IP address , packet type, port number etc.

CIRCUIT

LEVEL FIREWALLS

These firewalls work at the session layer of the OSI model, or TCP/IP layer of the TCP/IP. Monitor TCP handshaking between packets to determine whether a requested session is legitimate. Useful for hiding information about protected networks

APPLICATION LEVEL FIREWALL


These are the software firewalls Often used by companies specifically to monitor and log employee activity to protect a home computer from hackers Filter packets at the application layer of OSI or TCP/IP model

STATEFUL MULTILAYER FIREWALL

combine the aspects of the other three types of firewalls.

FIREWALLS USED .
By:

Anyone who is responsible for a private network that is connected to a public network needs firewall protection. Anyone who connects so much as a single computer to the Internet via modem. For: It is generally used to prevent Internet users from gaining access to a private or corporate network. It can be used to control which Internet service are available to users of the corporate network on the other side of the firewall.

S-ar putea să vă placă și