SlideShare a Scribd company logo
FIREWALL
• Almost every medium and large-scale organization has a presence on the Internet and has an organizational network
connected to it. Network partitioning at the boundary between the outside Internet and the internal network is
essential for network security. Sometimes the inside network (intranet) is referred to as the “trusted” side and the
external Internet as the “un-trusted” side
Own PC Server
TYPES OF FIREWALL
• Firewall is a network device that isolates organization’s internal network from larger
outside network/Internet. It can be a hardware, software, or combined system/both that
prevents unauthorized access to or from internal network. All data packets entering or leaving
the internal network pass through the firewall, which examines each packet and blocks those
that do not meet the specified security criteria.
Cont.…
Firewall is categorized into three basic types:
• Packet filter (Stateless & Stateful)
• Application-level gateway
• Circuit-level gateway
Network Layer or Packet Filtering Firewall
The first type of network firewall was the packet filter which would look at network addresses and ports of
the packet to determine if that packet should be allowed or blocked.
In this type of firewall deployment, the internal network is connected to the external network/Internet via a
router firewall. The firewall inspects and filters data packet-by packet.
Packet-filtering firewalls allow or block the packets mostly based on criteria such as source and/or
destination IP addresses, protocol, source and/or destination port numbers, and various other parameters
within the IP header.
Cont.…
• Filtering rules are based on information contained in a network packet:
• Source IP address: The IP address of the system that originated the IP packet (e.g.,192.178.1.1)
• Destination IP address: The IP address of the system the IP packet is trying to reach (e.g.,192.168.1.2)
• Source and destination transport-level address: The transport level {(e.g., Transmission Control
Protocol (TCP) or User Datagram Protocol (UDP)} port number, which defines applications such as
SNMP or TELNET
• IP protocol field: It’s work on a transport protocol which is transfer of data between end system using
the services of the network layer.
• Interface: For a router with three or more ports, which interface of the router the packet came from or
which interface of the router the packet is destined.
Network Layer firewall generally fall into two
sub-categories:
Stateful:
• Stateful firewall can watch traffic streams from
end-to-end. They are aware of communication
paths and can implement various IP security
functions such as tunnels and encryption. If a
packet does not match an exiting connection, it
will be evaluated according to the ruleset for new
connections. If a packet matches an existing
connection based on comparison with firewall’s
state table, it will be allowed to pass without
further processing.
Stateless:
• Stateless firewalls require less memory , and
can be faster for simple filters that require less
time to filter than to look up a session. They
may also be necessary for filtering stateless
network protocols that have no concept of a
session. However, they cannot make more
complex decisions based on what stage
communications between hosts have reached.
Access Control List
Application-level Gateways
• Application-level gateways tend to be more secure than packet
filters. Rather than trying to deal with the numerous possible
combinations that are to be allowed and forbidden at the TCP and
IP level, the application-level gateway need only scrutinize a few
allowable applications. In addition, it is easy to log and audit all
incoming traffic at the application level.
Application-level Gateways
TErminal NETworkFileTransfer Protocol
Simple MailTransfer ProtocolHypertextTransfer Protocol
Circuit-Level Gateway
• Circuit-level gateway work at the session layer of the OSI model, or as a “shim-layer”
between the application layer and the transport layer of the TCP/IP stack.
• A circuit-level gateway does not permit an end-to-end TCP connection; rather, the gateway
sets up two TCP connections, one between itself and a TCP user on an inner host and one
between itself and a TCP user on an outside host. Once the two connections are established,
the gateway typically relays TCP segments from one connection to the other without
examining the contents.
• A typical use of circuit-level gateways is a situation in which the system administrator trusts
the internal users. The gateway can be configured to support application-level or proxy
service on inbound connections and circuit-level functions for outbound connections.
Firewall and Types of firewall
Proxies
• A proxy server may act as a firewall by responding to input packets in the manner of an
application, while blocking other packets. A proxy server is a gateway from one network to
another for a specific network application, in the sense that it functions as a proxy on behalf
of the network user.
• Proxies make tempering with an internal system from external network more difficult, so
that misuse of one internal system would not necessarily cause a security reach exploitable
from outside the firewall.Conversely, intruders may hijack a publicly reachable system and
use it as proxy for their own purpose; the proxy then masquerades as that system to other
internal machines.While use of internal address spaces enhances security, crackers may
still employ method such as IP spoofing to attempt to pass packets to a target network.
NAT (Network AddressTranslation)
• Firewall often have network address translation(NAT) functionally, and the host
protected behind a firewall commonly have address in the “private address range”, as
defined in RFC 1918. firewall often have such functionality to hide the true address
of protected hosts. Originally, the NAT function was developed to address the limited
number of IPv4 routable addresses that could be used or assigned to companies or
individuals as well as reduce both the amount and therefore cost of obtaining enough
public addresses for every computer in an organization. Although NAT on its own is
not considered a security feature, hiding the addresses devices has become an often
used defence against network. (ex: VPN)
Ad

More Related Content

What's hot (20)

Firewall
FirewallFirewall
Firewall
nayakslideshare
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
iberrywifisecurity
 
Firewalls
FirewallsFirewalls
Firewalls
University of Central Punjab
 
Firewall
FirewallFirewall
Firewall
Apo
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
gaurav96raj
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
Akash R
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
Patten John
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
 
Firewall
FirewallFirewall
Firewall
Mudasser Afzal
 
Firewalls
FirewallsFirewalls
Firewalls
vaishnavi
 
Firewall
FirewallFirewall
Firewall
syeda zoya mehdi
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
TayabaZahid
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
poorvavyas4
 
Firewall
Firewall Firewall
Firewall
Amuthavalli Nachiyar
 
What is firewall
What is firewallWhat is firewall
What is firewall
Harshana Jayarathna
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 
Firewall
FirewallFirewall
Firewall
Nilkanth Shingala
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
Gaurav Dalvi
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
rahul kundu
 
Firewall
FirewallFirewall
Firewall
Muhammad Sohaib Afzaal
 

Similar to Firewall and Types of firewall (20)

Network defenses
Network defensesNetwork defenses
Network defenses
G Prachi
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
9921103075
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
sweta dargad
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
Puneet Bawa
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
Dr. Shivashankar
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
MOHIT AGARWAL
 
Firewall
FirewallFirewall
Firewall
Shivank Shah
 
Firewall and its Types
Firewall and its TypesFirewall and its Types
Firewall and its Types
crisma baby mathew
 
Cryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdfCryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdf
ahmeddeath6
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
Nutan Kumar Panda
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
vinay arora
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
ssuser530a07
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
Raj Kumar
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
Fabio Almeida- Oficina Eletrônica
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
suddenven
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
BachaSirata
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
Hem Pokhrel
 
Network security
 Network security Network security
Network security
Vikas Jagtap
 
Network defenses
Network defensesNetwork defenses
Network defenses
G Prachi
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
9921103075
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
sweta dargad
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
Puneet Bawa
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
Dr. Shivashankar
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
MOHIT AGARWAL
 
Cryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdfCryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdf
ahmeddeath6
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
vinay arora
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
Raj Kumar
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
suddenven
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
BachaSirata
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
Hem Pokhrel
 
Ad

More from Coder Tech (9)

HTML (Basic to Advance)
HTML (Basic to Advance)HTML (Basic to Advance)
HTML (Basic to Advance)
Coder Tech
 
PHP Course (Basic to Advance)
PHP Course (Basic to Advance)PHP Course (Basic to Advance)
PHP Course (Basic to Advance)
Coder Tech
 
Kotlin- Basic to Advance
Kotlin- Basic to Advance Kotlin- Basic to Advance
Kotlin- Basic to Advance
Coder Tech
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
Coder Tech
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
Coder Tech
 
Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)
Coder Tech
 
Structure of shared memory space
Structure of shared memory spaceStructure of shared memory space
Structure of shared memory space
Coder Tech
 
Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)
Coder Tech
 
Barcode & qr code
Barcode & qr codeBarcode & qr code
Barcode & qr code
Coder Tech
 
HTML (Basic to Advance)
HTML (Basic to Advance)HTML (Basic to Advance)
HTML (Basic to Advance)
Coder Tech
 
PHP Course (Basic to Advance)
PHP Course (Basic to Advance)PHP Course (Basic to Advance)
PHP Course (Basic to Advance)
Coder Tech
 
Kotlin- Basic to Advance
Kotlin- Basic to Advance Kotlin- Basic to Advance
Kotlin- Basic to Advance
Coder Tech
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
Coder Tech
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
Coder Tech
 
Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)Android (Types, Feature,Application etc..)
Android (Types, Feature,Application etc..)
Coder Tech
 
Structure of shared memory space
Structure of shared memory spaceStructure of shared memory space
Structure of shared memory space
Coder Tech
 
Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)Mother board (Part's of Motherboard)
Mother board (Part's of Motherboard)
Coder Tech
 
Barcode & qr code
Barcode & qr codeBarcode & qr code
Barcode & qr code
Coder Tech
 
Ad

Recently uploaded (19)

(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
OSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description fOSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description f
cbr49917
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)
APNIC
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
project_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptxproject_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptx
redzuriel13
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
OSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description fOSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description f
cbr49917
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)
APNIC
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
project_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptxproject_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptx
redzuriel13
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 

Firewall and Types of firewall

  • 1. FIREWALL • Almost every medium and large-scale organization has a presence on the Internet and has an organizational network connected to it. Network partitioning at the boundary between the outside Internet and the internal network is essential for network security. Sometimes the inside network (intranet) is referred to as the “trusted” side and the external Internet as the “un-trusted” side Own PC Server
  • 2. TYPES OF FIREWALL • Firewall is a network device that isolates organization’s internal network from larger outside network/Internet. It can be a hardware, software, or combined system/both that prevents unauthorized access to or from internal network. All data packets entering or leaving the internal network pass through the firewall, which examines each packet and blocks those that do not meet the specified security criteria.
  • 3. Cont.… Firewall is categorized into three basic types: • Packet filter (Stateless & Stateful) • Application-level gateway • Circuit-level gateway
  • 4. Network Layer or Packet Filtering Firewall The first type of network firewall was the packet filter which would look at network addresses and ports of the packet to determine if that packet should be allowed or blocked. In this type of firewall deployment, the internal network is connected to the external network/Internet via a router firewall. The firewall inspects and filters data packet-by packet. Packet-filtering firewalls allow or block the packets mostly based on criteria such as source and/or destination IP addresses, protocol, source and/or destination port numbers, and various other parameters within the IP header.
  • 5. Cont.… • Filtering rules are based on information contained in a network packet: • Source IP address: The IP address of the system that originated the IP packet (e.g.,192.178.1.1) • Destination IP address: The IP address of the system the IP packet is trying to reach (e.g.,192.168.1.2) • Source and destination transport-level address: The transport level {(e.g., Transmission Control Protocol (TCP) or User Datagram Protocol (UDP)} port number, which defines applications such as SNMP or TELNET • IP protocol field: It’s work on a transport protocol which is transfer of data between end system using the services of the network layer. • Interface: For a router with three or more ports, which interface of the router the packet came from or which interface of the router the packet is destined.
  • 6. Network Layer firewall generally fall into two sub-categories: Stateful: • Stateful firewall can watch traffic streams from end-to-end. They are aware of communication paths and can implement various IP security functions such as tunnels and encryption. If a packet does not match an exiting connection, it will be evaluated according to the ruleset for new connections. If a packet matches an existing connection based on comparison with firewall’s state table, it will be allowed to pass without further processing. Stateless: • Stateless firewalls require less memory , and can be faster for simple filters that require less time to filter than to look up a session. They may also be necessary for filtering stateless network protocols that have no concept of a session. However, they cannot make more complex decisions based on what stage communications between hosts have reached.
  • 8. Application-level Gateways • Application-level gateways tend to be more secure than packet filters. Rather than trying to deal with the numerous possible combinations that are to be allowed and forbidden at the TCP and IP level, the application-level gateway need only scrutinize a few allowable applications. In addition, it is easy to log and audit all incoming traffic at the application level.
  • 9. Application-level Gateways TErminal NETworkFileTransfer Protocol Simple MailTransfer ProtocolHypertextTransfer Protocol
  • 10. Circuit-Level Gateway • Circuit-level gateway work at the session layer of the OSI model, or as a “shim-layer” between the application layer and the transport layer of the TCP/IP stack. • A circuit-level gateway does not permit an end-to-end TCP connection; rather, the gateway sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host. Once the two connections are established, the gateway typically relays TCP segments from one connection to the other without examining the contents. • A typical use of circuit-level gateways is a situation in which the system administrator trusts the internal users. The gateway can be configured to support application-level or proxy service on inbound connections and circuit-level functions for outbound connections.
  • 12. Proxies • A proxy server may act as a firewall by responding to input packets in the manner of an application, while blocking other packets. A proxy server is a gateway from one network to another for a specific network application, in the sense that it functions as a proxy on behalf of the network user. • Proxies make tempering with an internal system from external network more difficult, so that misuse of one internal system would not necessarily cause a security reach exploitable from outside the firewall.Conversely, intruders may hijack a publicly reachable system and use it as proxy for their own purpose; the proxy then masquerades as that system to other internal machines.While use of internal address spaces enhances security, crackers may still employ method such as IP spoofing to attempt to pass packets to a target network.
  • 13. NAT (Network AddressTranslation) • Firewall often have network address translation(NAT) functionally, and the host protected behind a firewall commonly have address in the “private address range”, as defined in RFC 1918. firewall often have such functionality to hide the true address of protected hosts. Originally, the NAT function was developed to address the limited number of IPv4 routable addresses that could be used or assigned to companies or individuals as well as reduce both the amount and therefore cost of obtaining enough public addresses for every computer in an organization. Although NAT on its own is not considered a security feature, hiding the addresses devices has become an often used defence against network. (ex: VPN)