SlideShare a Scribd company logo
Introduction of firewall slides
 Define what is firewall ?
 Need of firewall
 Types of firewall
› Hardware firewall
 Advantage and disadvantage
› Software firewall
 Advantage and disadvantage
 Types of firewall techniques
› Packet filter
 Drawback of packet filtering
› Application gateway
 advantage
› Circuit-level gateway
› Bastion host
 What a personal firewall can do
 What a personal firewall can not do
 Manufacturing companies
 Firewall is device that provides secure
connectivity between
networks(internal/external).
 A firewall may be a hardware, software of a
combination of both that is used to prevent
unauthorized program or internet users from
accessing a private network or a single
computer.
 All message entering or leaving the intranet
pass through the firewall, which examines
each message & blocks those that do not
meet the specified security criteria.
 To protect confidential
information from those
who do not explicitly need
to access it.
 To protect our network &
its resources from
malicious users &
accidents that originate
outside of our network.
 Hardware firewall
 Software firewall
 It is a physical device.
 It can be installed
between the modem and
computer.
 It can be incorporated
into a broadband router
being used to share the
internet connection.
 Protect an entire network.
 Usually more expensive, header to configure
 E.g.- Cisco pix, netscreen, watchfuard etc.
 Uses very little system resources.
 More secure
 Enhanced security control
 Dedicated hardware firewalls are typically more
reliable
 Easy to disable or remove
 Work independently of associated computer
system.
 Install process is more demanding both
physically and mentally.
 Takes up physical work space
 More expensive
 Harder to upgrade and repair
 It is a software
application.
 It is installed onto the
computer system that
you wish to protect .
 Protect a single computer
 This is usually the computer with modem
attached to it.
 Usually less expensive, easier to configure
 E.g.- Norton internet security, MacAfee
internet security etc.
 Considerably cheaper or even free.
 Simple to install and upgrade
 Requires no physical changes to hardware
or network
 Ideal for home/family use
 Takes up no physical space.
 Software may crash or be incompatible with
system
 Can be difficult to completely disable &
especially remove
 Software bugs may compromise security
 Can be resource hungry
 Incompatibilities with OS.
 Packet filter
 Application gateway/proxy server/proxy
application gateway
 Circuit-level gateway
 Bastion host
 It looks at each packet entering or leaving
the network accepts or rejects it based on
user-defined rules.
Applications
Presentations
Sessions
Transport
Data Link
Physical
Data Link
Physical
Router
Applications
Presentations
Sessions
Transport
Data Link
Physical
Network Network
 Packet filtering is fairly effective &
transparent to users, but it is difficult to
configure.
 In addition, it is susceptible to IP spoofing.
 Drawback of packet filtering technique:-
i. Packet filtering rules can be complex.
ii. Logging facility is not provided by such
firewall.
iii. If TCP/IP packet filtering is not implemented
fully, it can lead to security hole.
iv. Cannot handle RPC (remote produce calls)
 In such type of firewall remote host or
network can interact only with proxy server,
proxy server is responsible for hiding the
details of the internal network i.e. intranet.
 Users uses TCP/IP application, such as FTP
& Telnet servers.
Applications
Presentations
Sessions
Transport
Data Link
Physical
Network
Data Link
Physical
Applications
Presentations
Sessions
Transport
Data Link
Physical
Application Gateway
Applications
Presentations
Sessions
Transport
Network Network
Telnet HTTPFTP
 This is very effective, but can impose a
performance degradation.
 Advantages of application gateway:-
i. Less complex filter rules
ii. Cost effectiveness
iii. Robust authentication & logging facility
iv. Proxy authenticates only those services for
v. Which it is configured/installed.
 It is a stand alone application.
 It does not permit end-to-end TCP connection. it
sets up 2 TCP connection:-
• Between itself and a TCP user on an inner host.
• Between itself and a TCP user on an outer host.
 Bastion host is a special purpose computer
on a network specifically designed and
configured to withstand attacks.
 It generally hosts a single application,
provides platform for application gateway
and circuit-level gateway.
 It supports limited/specific applications to
reduce the threat to the computer.
 Include application-Telnet, SMTP, FTP
 Stop hackers from accessing your
computer.
 Protect your personal information.
 Blocks “pop up” ads and certain
cookies.
 Determines which programs can
access the internet.
 Block invalid packets.
 Cannot prevent e-mail
viruses
-only an antivirus product
with update definitions
can prevent e-mail viruses.
 After setting it initially,
you cannot forget about it
-The firewall will require
periodic updates to the rule sets and the software itself.
 Cisco system, Inc.
 Nortel networks corporation
 Juniper networks, Inc.
 MacAfee, Inc.
 3com corporation
 Citrix systems, Inc
Introduction of firewall slides

More Related Content

PPTX
Firewall and its purpose
PPT
FireWall
PPTX
PPT
Firewall Security Definition
PPTX
Firewall presentation
PPT
PPT
firewall.ppt
Firewall and its purpose
FireWall
Firewall Security Definition
Firewall presentation
firewall.ppt

What's hot (20)

PPTX
Firewall security in computer network
PPTX
Firewall presentation
PPTX
Network security
PPTX
NETWORK SECURITY
PPTX
Network Security
PPTX
Network security
PDF
Network Security Fundamentals
PPTX
Network security
PPT
Network Security
PPTX
Types Of Firewall Security
PPTX
Firewall and its types and function
PPTX
Logging, monitoring and auditing
PPTX
firewall and its types
PPT
Firewall protection
PPT
Industrial control systems cybersecurity.ppt
PPTX
Network Security
PPTX
Firewall ( Cyber Security)
PPTX
Cyber security
PPTX
Firewall and Types of firewall
PPT
Network Security
Firewall security in computer network
Firewall presentation
Network security
NETWORK SECURITY
Network Security
Network security
Network Security Fundamentals
Network security
Network Security
Types Of Firewall Security
Firewall and its types and function
Logging, monitoring and auditing
firewall and its types
Firewall protection
Industrial control systems cybersecurity.ppt
Network Security
Firewall ( Cyber Security)
Cyber security
Firewall and Types of firewall
Network Security
Ad

Similar to Introduction of firewall slides (20)

PPT
INTRODUCTION TO FIREWELL
PPTX
Firewall & DMZ.pptx
PDF
[9] Firewall.pdf
PPT
Unit II Chapter 6 firewalls.ppt
PPTX
Firewalls
PPTX
PPT
Introduction to firewalls
PPTX
Firewall presentation
PDF
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
PDF
Firewall.pdf
PPTX
Firewall
PPT
Tech 101: Understanding Firewalls
PPTX
Firewall ppt.pptx
PPTX
csefirewall in network.ppt-170825044521.pptx
PPTX
Firewalls-Intro
PPT
Firewall in tell communication_Basics.ppt
PPT
Firewall
PPTX
Firewall Design and Implementation
INTRODUCTION TO FIREWELL
Firewall & DMZ.pptx
[9] Firewall.pdf
Unit II Chapter 6 firewalls.ppt
Firewalls
Introduction to firewalls
Firewall presentation
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewall.pdf
Firewall
Tech 101: Understanding Firewalls
Firewall ppt.pptx
csefirewall in network.ppt-170825044521.pptx
Firewalls-Intro
Firewall in tell communication_Basics.ppt
Firewall
Firewall Design and Implementation
Ad

More from rahul kundu (17)

PPTX
Material management
PPTX
Business function in organization
PPTX
Document object model(dom)
PPTX
Document object model(dom)
PPTX
PPTX
PPTX
Internet
PPTX
Type of internet connectivity
PPTX
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
PPTX
Introduction of tcp, ip & udp
PPTX
Electronic payment system(EPS)
PPTX
Ipv4 and Ipv6
PPTX
Authentication, authorization, accounting(aaa) slides
PPT
Electronic data-interchange slides
PPTX
Client server security threats
PPTX
Virus slides
PPTX
Mpeg 7 slides
Material management
Business function in organization
Document object model(dom)
Document object model(dom)
Internet
Type of internet connectivity
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Introduction of tcp, ip & udp
Electronic payment system(EPS)
Ipv4 and Ipv6
Authentication, authorization, accounting(aaa) slides
Electronic data-interchange slides
Client server security threats
Virus slides
Mpeg 7 slides

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Machine learning based COVID-19 study performance prediction
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Cloud computing and distributed systems.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Electronic commerce courselecture one. Pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
cuic standard and advanced reporting.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Per capita expenditure prediction using model stacking based on satellite ima...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Review of recent advances in non-invasive hemoglobin estimation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The Rise and Fall of 3GPP – Time for a Sabbatical?
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine learning based COVID-19 study performance prediction
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Network Security Unit 5.pdf for BCA BBA.
A comparative analysis of optical character recognition models for extracting...
Cloud computing and distributed systems.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
NewMind AI Weekly Chronicles - August'25-Week II
Electronic commerce courselecture one. Pdf
Big Data Technologies - Introduction.pptx
A Presentation on Artificial Intelligence
Assigned Numbers - 2025 - Bluetooth® Document
cuic standard and advanced reporting.pdf

Introduction of firewall slides

  • 2.  Define what is firewall ?  Need of firewall  Types of firewall › Hardware firewall  Advantage and disadvantage › Software firewall  Advantage and disadvantage
  • 3.  Types of firewall techniques › Packet filter  Drawback of packet filtering › Application gateway  advantage › Circuit-level gateway › Bastion host  What a personal firewall can do  What a personal firewall can not do  Manufacturing companies
  • 4.  Firewall is device that provides secure connectivity between networks(internal/external).
  • 5.  A firewall may be a hardware, software of a combination of both that is used to prevent unauthorized program or internet users from accessing a private network or a single computer.  All message entering or leaving the intranet pass through the firewall, which examines each message & blocks those that do not meet the specified security criteria.
  • 6.  To protect confidential information from those who do not explicitly need to access it.  To protect our network & its resources from malicious users & accidents that originate outside of our network.
  • 7.  Hardware firewall  Software firewall
  • 8.  It is a physical device.  It can be installed between the modem and computer.  It can be incorporated into a broadband router being used to share the internet connection.
  • 9.  Protect an entire network.  Usually more expensive, header to configure  E.g.- Cisco pix, netscreen, watchfuard etc.
  • 10.  Uses very little system resources.  More secure  Enhanced security control  Dedicated hardware firewalls are typically more reliable  Easy to disable or remove  Work independently of associated computer system.
  • 11.  Install process is more demanding both physically and mentally.  Takes up physical work space  More expensive  Harder to upgrade and repair
  • 12.  It is a software application.  It is installed onto the computer system that you wish to protect .
  • 13.  Protect a single computer  This is usually the computer with modem attached to it.  Usually less expensive, easier to configure  E.g.- Norton internet security, MacAfee internet security etc.
  • 14.  Considerably cheaper or even free.  Simple to install and upgrade  Requires no physical changes to hardware or network  Ideal for home/family use  Takes up no physical space.
  • 15.  Software may crash or be incompatible with system  Can be difficult to completely disable & especially remove  Software bugs may compromise security  Can be resource hungry  Incompatibilities with OS.
  • 16.  Packet filter  Application gateway/proxy server/proxy application gateway  Circuit-level gateway  Bastion host
  • 17.  It looks at each packet entering or leaving the network accepts or rejects it based on user-defined rules. Applications Presentations Sessions Transport Data Link Physical Data Link Physical Router Applications Presentations Sessions Transport Data Link Physical Network Network
  • 18.  Packet filtering is fairly effective & transparent to users, but it is difficult to configure.  In addition, it is susceptible to IP spoofing.
  • 19.  Drawback of packet filtering technique:- i. Packet filtering rules can be complex. ii. Logging facility is not provided by such firewall. iii. If TCP/IP packet filtering is not implemented fully, it can lead to security hole. iv. Cannot handle RPC (remote produce calls)
  • 20.  In such type of firewall remote host or network can interact only with proxy server, proxy server is responsible for hiding the details of the internal network i.e. intranet.  Users uses TCP/IP application, such as FTP & Telnet servers.
  • 21. Applications Presentations Sessions Transport Data Link Physical Network Data Link Physical Applications Presentations Sessions Transport Data Link Physical Application Gateway Applications Presentations Sessions Transport Network Network Telnet HTTPFTP
  • 22.  This is very effective, but can impose a performance degradation.
  • 23.  Advantages of application gateway:- i. Less complex filter rules ii. Cost effectiveness iii. Robust authentication & logging facility iv. Proxy authenticates only those services for v. Which it is configured/installed.
  • 24.  It is a stand alone application.  It does not permit end-to-end TCP connection. it sets up 2 TCP connection:- • Between itself and a TCP user on an inner host. • Between itself and a TCP user on an outer host.
  • 25.  Bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks.
  • 26.  It generally hosts a single application, provides platform for application gateway and circuit-level gateway.  It supports limited/specific applications to reduce the threat to the computer.  Include application-Telnet, SMTP, FTP
  • 27.  Stop hackers from accessing your computer.  Protect your personal information.  Blocks “pop up” ads and certain cookies.  Determines which programs can access the internet.  Block invalid packets.
  • 28.  Cannot prevent e-mail viruses -only an antivirus product with update definitions can prevent e-mail viruses.  After setting it initially, you cannot forget about it -The firewall will require periodic updates to the rule sets and the software itself.
  • 29.  Cisco system, Inc.  Nortel networks corporation  Juniper networks, Inc.  MacAfee, Inc.  3com corporation  Citrix systems, Inc