SlideShare a Scribd company logo
2
Most read
3
Most read
7
Most read
2-Intro to Firewall Concepts
• Traditional Firewall (Stateless)
• Unified Threat Management (UTM)
• Next Generation Firewall (NGFW)
• UTM vs. NGFW
• Internal Segmentation Firewall ( ISFW )
Traditional Firewall (Stateless) = Packet Filter Firewall
A traditional firewall filters traffic based on mainly the following parameters :
• Source IP address and destination IP address of the network packets.
• Source port and destination port of the inbound and outbound traffic.
• Current stage of connection.
• Filtering rules based on per process basis.
• Protocols used.
• Routing features.
Traditional Firewall (F.W)
Other common features of a traditional firewall include support
• Routing
• Network Address Translation (NAT)
• Port Address Translation (PAT)
• Virtual Private Network (VPN)
01- intro to firewall concepts
Why Legacy Firewalls Are No Longer Effective?
URL Web Filtering
Classify traffic based on applications, not ports.
Traditional firewalls can filter traffic based on port,
but that may prove to be inconvenient at times.
Layers 2 & 3 & 4
UTM can associate traffic based on application,
which enables it to block or monitor network traffic
per application and troubleshoot problems based on that.
Layers 7
Managing Users and Use Policies
Stopping Malware, Intrusions and Advanced Attacks
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Inspecting SSL Traffic
01- intro to firewall concepts
01- intro to firewall concepts
01- intro to firewall concepts
01- intro to firewall concepts
Internal Segmentation Firewall ( ISFW )= Data Center Firewall
01- intro to firewall concepts

More Related Content

What's hot (20)

PDF
Palo alto outline course | Mostafa El Lathy
Mostafa El Lathy
 
PDF
17 palo alto threat prevention concept
Mostafa El Lathy
 
PDF
12 palo alto app-id concept
Mostafa El Lathy
 
PDF
19 high availability
Mostafa El Lathy
 
PDF
13 palo alto url web filtering concept
Mostafa El Lathy
 
PDF
4 palo alto licenses
Mostafa El Lathy
 
PDF
16 palo alto ssl decryption policy concept
Mostafa El Lathy
 
PDF
Palo alto-review
Rayan Darine
 
PDF
Palo alto networks product overview
Belsoft
 
PPT
Palo alto networks next generation firewalls
Castleforce
 
PDF
5 initial access to palo alto using cli
Mostafa El Lathy
 
PDF
9 palo alto virtual routers concept (routing on palo alto)
Mostafa El Lathy
 
PPTX
Cisco ASA Firewalls
Bryley Systems Inc.
 
PPTX
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
BAKOTECH
 
DOCX
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
David kankam
 
PDF
14 palo alto quality of service(qos) concept
Mostafa El Lathy
 
PDF
15 intro to ssl certificate & pki concept
Mostafa El Lathy
 
PPT
Presentacion Palo Alto Networks
Laurent Daudré-Vignier
 
PPTX
SD WAN
Bri Molina
 
PPTX
Palo alto NGfw2023.pptx
ahmad661583
 
Palo alto outline course | Mostafa El Lathy
Mostafa El Lathy
 
17 palo alto threat prevention concept
Mostafa El Lathy
 
12 palo alto app-id concept
Mostafa El Lathy
 
19 high availability
Mostafa El Lathy
 
13 palo alto url web filtering concept
Mostafa El Lathy
 
4 palo alto licenses
Mostafa El Lathy
 
16 palo alto ssl decryption policy concept
Mostafa El Lathy
 
Palo alto-review
Rayan Darine
 
Palo alto networks product overview
Belsoft
 
Palo alto networks next generation firewalls
Castleforce
 
5 initial access to palo alto using cli
Mostafa El Lathy
 
9 palo alto virtual routers concept (routing on palo alto)
Mostafa El Lathy
 
Cisco ASA Firewalls
Bryley Systems Inc.
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
BAKOTECH
 
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
David kankam
 
14 palo alto quality of service(qos) concept
Mostafa El Lathy
 
15 intro to ssl certificate & pki concept
Mostafa El Lathy
 
Presentacion Palo Alto Networks
Laurent Daudré-Vignier
 
SD WAN
Bri Molina
 
Palo alto NGfw2023.pptx
ahmad661583
 

Similar to 01- intro to firewall concepts (20)

PPTX
Lecture-13-Firewall_information_Security.pptx
homecooking511
 
PPTX
Seminar
Abhinav Kushwah
 
PPTX
Cyber Security - Firewall and Packet Filters
Radhika Talaviya
 
PPTX
Firewall
Saurabh Chauhan
 
PPT
Introduction to firewalls
Divya Jyoti
 
PPTX
Firewall Design and Implementation
ajeet singh
 
PPTX
Firewall Design and Implementation
ajeet singh
 
PPT
firewall.ppt
ssuser530a07
 
PPTX
Why Its time to Upgrade a Next-Generation Firewall
Ali Kapucu
 
PPT
Network security
Vikas Jagtap
 
PPTX
Information Security (Firewall)
Zara Nawaz
 
PPTX
Firewalls
vaishnavi
 
PPTX
Firewall ( Cyber Security)
Jainam Shah
 
PPTX
firewall firewall firewall firewall firewall firewall firewall firewall
Nagaraja465570
 
PPTX
Firewall in Network Security
lalithambiga kamaraj
 
PPTX
firewall as a security measure (1)-1.pptx
ShreyaBanerjee52
 
PDF
Cryptography Project by Aelsayed & Kyasser.pdf
ahmeddeath6
 
PPTX
Firewall
Tapan Khilar
 
PPTX
Changes to Priority 2 E-Rate: How Pine Cove Consulting and Sophos Can Help
Pine Cove Consulting
 
PPTX
Firewall
Nilkanth Shingala
 
Lecture-13-Firewall_information_Security.pptx
homecooking511
 
Cyber Security - Firewall and Packet Filters
Radhika Talaviya
 
Firewall
Saurabh Chauhan
 
Introduction to firewalls
Divya Jyoti
 
Firewall Design and Implementation
ajeet singh
 
Firewall Design and Implementation
ajeet singh
 
firewall.ppt
ssuser530a07
 
Why Its time to Upgrade a Next-Generation Firewall
Ali Kapucu
 
Network security
Vikas Jagtap
 
Information Security (Firewall)
Zara Nawaz
 
Firewalls
vaishnavi
 
Firewall ( Cyber Security)
Jainam Shah
 
firewall firewall firewall firewall firewall firewall firewall firewall
Nagaraja465570
 
Firewall in Network Security
lalithambiga kamaraj
 
firewall as a security measure (1)-1.pptx
ShreyaBanerjee52
 
Cryptography Project by Aelsayed & Kyasser.pdf
ahmeddeath6
 
Firewall
Tapan Khilar
 
Changes to Priority 2 E-Rate: How Pine Cove Consulting and Sophos Can Help
Pine Cove Consulting
 
Ad

Recently uploaded (20)

PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PPTX
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
PPT
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
PDF
Persuasive AI: risks and opportunities in the age of digital debate
Speck&Tech
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
July Patch Tuesday
Ivanti
 
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
Persuasive AI: risks and opportunities in the age of digital debate
Speck&Tech
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Ad

01- intro to firewall concepts

  • 1. 2-Intro to Firewall Concepts • Traditional Firewall (Stateless) • Unified Threat Management (UTM) • Next Generation Firewall (NGFW) • UTM vs. NGFW • Internal Segmentation Firewall ( ISFW )
  • 2. Traditional Firewall (Stateless) = Packet Filter Firewall A traditional firewall filters traffic based on mainly the following parameters : • Source IP address and destination IP address of the network packets. • Source port and destination port of the inbound and outbound traffic. • Current stage of connection. • Filtering rules based on per process basis. • Protocols used. • Routing features.
  • 3. Traditional Firewall (F.W) Other common features of a traditional firewall include support • Routing • Network Address Translation (NAT) • Port Address Translation (PAT) • Virtual Private Network (VPN)
  • 5. Why Legacy Firewalls Are No Longer Effective?
  • 7. Classify traffic based on applications, not ports. Traditional firewalls can filter traffic based on port, but that may prove to be inconvenient at times. Layers 2 & 3 & 4 UTM can associate traffic based on application, which enables it to block or monitor network traffic per application and troubleshoot problems based on that. Layers 7
  • 8. Managing Users and Use Policies
  • 9. Stopping Malware, Intrusions and Advanced Attacks
  • 10. Intrusion Detection System (IDS) Intrusion Prevention System (IPS)
  • 16. Internal Segmentation Firewall ( ISFW )= Data Center Firewall