0% found this document useful (0 votes)
15 views

Presentation of - Firewall

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Presentation of - Firewall

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

“Firewall In Computer

Network”
Presented By: Yaman Bhandari
Introduction to Firewall:

 A firewall is a network security device/system that monitors and


controls incoming and outgoing traffic based on security rules.
 It acts as a barrier between a trusted internal network and untrusted
external networks (e.g., the internet).
 Purpose: To block unauthorized access while permitting legitimate
communications.
Hardware vs Software Firewall:

Feature Hardware Firewall Software Firewall


Scope Entire network Individual devices
High (designed for large Lower (depends on
Performance
networks) device resources)
Cost Expensive More affordable
Requires installation on
Management Centralized management
each device
Deployment Network perimeter On each device
Windows Firewall,
Example Cisco ASA, FortiGate
ZoneAlarm
Traditional Firewalls

 It is also known as Packet-Filtering Firewalls or Stateful Firewalls.


 It monitors traffic based on IP addresses, ports, and protocols.
 It operates at Layer 3 (Network) and Layer 4 (Transport) of the OSI
model.
Key Features:

 Packet Filtering: Allows or blocks packets based on predefined rules.


 Stateful Inspection: Tracks active connections and ensures that only
packets belonging to legitimate connections are allowed.
 Example: Cisco ASA (older models).
Limitations:

 It cannot inspect the contents of packets (no deep packet inspection).


 It is vulnerable to application-layer attacks (e.g., malware, SQL
injection).
Next-Generation Firewall (NGFW)

 It combines traditional firewall features with advanced threat


detection and application-level inspection.
 It operates up to Layer 7 (Application) of the OSI model.
 Example: Palo Alto Networks, FortiGate NGFW.
Key Features:

 Deep Packet Inspection (DPI): Inspects the full packet, including its
contents.
 Application Awareness: Identifies and controls traffic based on specific
applications (e.g., block social media apps, allow business apps).
 Integrated Intrusion Prevention System (IPS): Detects and blocks
sophisticated attacks in real time.
 SSL Inspection: Can decrypt and inspect encrypted traffic.
 Threat Intelligence: Uses external databases to detect and block
emerging threats like zero-day exploits.
Web Application Firewall (WAF)

 It is a specialized firewall that focuses on protecting web applications


from specific threats.
 It operates at Layer 7 (Application) and filters HTTP/HTTPS traffic.
 Example: AWS WAF, Cloudflare WAF, F5 BIG-IP WAF.
Key Features:

 Protects against common web threats: Blocks SQL injection, Cross-site


scripting (XSS), Cross-site request forgery (CSRF), etc.
 Content Filtering: Prevents malicious inputs from reaching web servers.
 Rate Limiting: Helps mitigate DDoS attacks by controlling traffic flow.
 Virtual Patching: Shields vulnerabilities in web applications before official
patches are applied.
Thank You!!

You might also like