100% found this document useful (1 vote)
163 views23 pages

An Introduction To Firewall Technology

This document provides an introduction to firewall technology. It begins with defining a firewall as a security gateway between trusted and untrusted networks, such as between a corporate network and the Internet, that tracks and controls network communications. It then discusses why organizations need firewalls to prevent attacks, protect data integrity, and preserve confidence. The document outlines various firewall features and types, including packet filtering, application proxies, and stateful inspection. It also discusses deploying firewalls at the corporate network gateway and within internal network segments. While firewalls are a foundation of enterprise security, the document notes they can slow down networks and be susceptible to denial of service attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
163 views23 pages

An Introduction To Firewall Technology

This document provides an introduction to firewall technology. It begins with defining a firewall as a security gateway between trusted and untrusted networks, such as between a corporate network and the Internet, that tracks and controls network communications. It then discusses why organizations need firewalls to prevent attacks, protect data integrity, and preserve confidence. The document outlines various firewall features and types, including packet filtering, application proxies, and stateful inspection. It also discusses deploying firewalls at the corporate network gateway and within internal network segments. While firewalls are a foundation of enterprise security, the document notes they can slow down networks and be susceptible to denial of service attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

AN INTRODUCTION TO

FIREWALL
TECHNOLOGY
A LEADING TECHNOLOGY

By,
MOHAMMAD MAAZ
CS-3RD YEAR
1128410032(27)

AGENDA
What is a firewall
Why an organization needs a firewall
Features of firewall
Types of firewalls and technologies
Deploying a firewall
Disavantage of firewall

WHAT IS A FIREWALL ?
Internet

A firewall :

Corporate Network
Gateway

Acts as a security gateway


between two networks
Usually between trusted and
untrusted networks (such as
between a corporate network
and the Internet)
Corporate
Site

WHAT IS A FIREWALL ?
Internet

A firewall :

Allow Traffic
to Internet

Acts as a security gateway


between two networks

Block traffic
from Internet

Tracks and controls network


communications

Decides whether to
pass, reject, encrypt,
or log communications
(Access Control)

Corporate
Site

WHY FIREWALLS ARE NEEDED

Prevent attacks from untrusted networks


Protect data integrity of critical information
Preserve customer and partner confidence

GENERAL FIREWALL FEATURES

Port Control
Network Address Translation
Application Monitoring (Program Control)
Packet Filtering

ADDITIONAL FIREWALL FEATURES


Data encryption
Hiding presence
Reporting/logging
e-mail virus protection
Pop-up ad blocking
Cookie digestion
Spy ware protection etc.

EVOLUTION OF FIREWALLS
Stateful
Inspection

Application
Proxy

Packet
Filter

Stage of Evolution

PACKET FILTER

Packets examined at the network layer


Useful first line of defense - commonly
deployed on routers
Simple accept or reject decision model
No awareness of higher protocol layers
Applications

Applications

Applications

Presentations

Presentations

Presentations

Sessions

Sessions

Sessions

Transport

Transport

Transport

Network

Network

Network

Data Link

Data Link

Data Link

Physical

Physical

Physical

APPLICATION GATEWAY OR PROXY

Packets examined at the application layer


Application/Content filtering possible prevent FTP put commands, for example
Modest performance
Scalability limited
Applications

Applications

Applications

Presentations

Presentations

Presentations

Sessions

Sessions

Sessions

Transport

Transport

Transport

Network

Network

Network

Data Link

Data Link

Data Link

Physical

Physical

Physical

STATEFUL INSPECTION
Packets Inspected between data link layer and network
layer in the OS kernel
State tables are created to maintain connection context
Invented by Check Point

Applications

Applications

Presentations

Applications

Presentations

Sessions

Presentations

Sessions

Transport

Sessions

Transport

Network

Transport
Network

Network
Data Link

Data Link

Data Link

Physical

Physical

Physical

INSPECT Engine
Dynamic
State Tables

NETWORK ADDRESS TRANSLATION (NAT)


192.172.1.1-192.172.1.254

Internal
IP Addresses
Corporate LAN

219.22.165.1
Internet

Public
IP Address(es)

Converts a networks illegal IP addresses


to legal or public IP addresses
Hides the true addresses of individual hosts,
protecting them from attack
Allows more devices to be connected to the
network

PORT ADDRESS TRANSLATIONHIDING


PATGlobal
192.168.0.15

10.0.0.2

10.0.0.2

192.168.0.15

172.30.0.50

172.30.0.50

49090

2000

23

23

10.0.0.3

192.168.0.15

172.30.0.50
49090
10.0.0.3

23

172.30.0.50
2001
23

PERSONAL FIREWALLS

Need arises from always on connections


Your PC is not protected enough by your OS
Intrusion detection facilities
Different levels of security
Templates

FIREWALL DEPLOYMENT
DMZ

Internet
Demilitarized Zone
(DMZ)
Public Servers

Corporate Network Gateway

Corporate Network
Gateway

Protect internal network from


attack

Human Resources
Network

Most common deployment point

Corporate
Site

FIREWALL DEPLOYMENT
Corporate Network Gateway
Internal Segment Gateway

Internet
Public Servers

Protect sensitive segments


(Finance, HR, Product
Development)

Demilitarized Zone
(Publicly-accessible
servers)

Provide second layer of defense

Human Resources
Network

Ensure protection against


internal attacks and misuse

Internal Segment Gateway

Corporate
Site

FIREWALL DEPLOYMENT
Corporate Network
Gateway

Internet
Public Servers
DMZ

Internal Segment
Gateway
Server-Based Firewall

Human Resources
Network

Protect individual
application servers
Files protect

Server-Based
Firewall
Corporate
Site

SAP
Server

FIREWALL DEPLOYMENT
Hardware appliance based firewall

Single platform, software pre-installed

Can be used to support small organizations or branch offices with


little IT support

Software based firewall

Flexible platform deployment options

Can scale as organization grows

DISADVANTAGE OF FIREWALL:
slow down network access dramatically
more susceptible to distributed denial of service
(DDOS) attacks.
not transparent to end users
require manual configuration of each client computer

SUMMARY

Firewalls foundation of an enterprise security policy


Stateful Inspection is the leading firewall technology

RESOURCES
http://www.tlc.discovery.com/converg
ence/hackers/hackers.html
http://www.tuxedo.org/~esr/faqs/hack
er-howto.html
http://www.iss.net/security_center/ad
vice/Underground/Hacking/Methods/Tech
nical/
http://www.infosecuritymag.com/articl
es/march01/features4_battle_plans.sht
ml
http://www.nmrc.org/faqs/www/wsec09
.html
http://www.microsoft.com/
www.Google.com
www.Wikipedia.com

ANY QUESTIONS????????

You might also like