Firewall and its purpose
FIRE
WALL
+                      =


But does fire + wall =firewall ??? Is this definition
correct??
Well not exactly 
Finally, welcome to last presentation
 of the 8th SEM CSE
FIREWALLS


Presented by-
1) Rohit Phulsunge
2) Satyendra Singh Naruka
3) Saurabh Maheswari
4) Sameer Pathak
5) Sandeep Suryawanshi
So what exaclty is a firewall??
   A firewall is a device or set of devices
    designed to permit or deny network
    transmissions based upon a set of
    rules and is frequently used to protect
    networks from unauthorized access
    while permitting legitimate
    communications to pass.
A diagram showing where a
firewall can be placed.
History
 The term firewall originally referred to
  a wall intended to confine a fire or
  potential fire within a building
 Later uses refer to similar structures,
  such as the metal sheet separating
  the engine compartment of a vehicle
  or aircraft from the passenger
  compartment.
What does firewall do?
 a choke point of control and
  monitoring
 interconnects networks with differing
  trust
 imposes restrictions on network
  services
    ◦ only authorized traffic is allowed
   auditing and controlling access
    ◦ can implement alarms for abnormal
      behavior
   provide NAT & usage monitoring
Firewall Limitations
   cannot protect from attacks bypassing
    it
    ◦ E.g., sneaker net, utility modems, trusted
      organisations, trusted services (eg
      SSL/SSH)
   cannot protect against internal threats
    ◦ eg disgruntled or colluding employees
   cannot protect against transfer of all
    virus infected programs or files
    ◦ because of huge range of O/S & file types
Firewalls – Packet Filters
 simplest, fastest firewall component
 foundation of any firewall system
 examine each IP packet (no context)
  and permit or deny according to rules
 hence restrict access to services
  (ports)
 possible default policies
    ◦ that not expressly permitted is prohibited
    ◦ that not expressly prohibited is permitted
                                                   12
Firewalls – Packet Filters




                             13
Firewalls – Packet Filters




                             14
Attacks on Packet Filters
   IP address spoofing
    ◦ fake source address
    ◦ authenticate
   source routing attacks
    ◦ attacker sets a route other than default
    ◦ block source routed packets
   tiny fragment attacks
    ◦ split header info over several tiny packets
    ◦ either discard or reassemble before check

                                                 15
Firewalls – Stateful Packet
Filters
   traditional packet filters do not examine
    higher layer context
    ◦ i.e., matching return packets with outgoing flow
 stateful packet filters address this need
 they examine each IP packet in context
    ◦ keep track of client-server sessions
    ◦ check each packet validly belongs to one
   they are better able to detect bogus packets
    out of context


                                                         16
TYPES OF FIREWALLS
   Packet filtering Router

   Application level gateway

   Circuit level gateway




                                17
Packet filtering Router
Apply set of rules to IP packet
*Rules for network packet
 Source IP Address
 Destination IP Address
 Source & Destination transport level
  address
 IP protocol field
 Interface

                                         18
Application Level Gateway

 have application specific gateway /
  proxy
 has full access to protocol
    ◦ user requests service from proxy
    ◦ proxy validates request as legal
    ◦ then actions request and returns result to
      user
    ◦ can log / audit traffic at application level


                                                     19
Application Level Gateway




                            20
Firewalls - Circuit Level
Gateway
 relays two TCP connections
 imposes security by limiting what such
  connections are allowed
 once created usually relays traffic
  without examining contents
 typically used when trust internal
  users by allowing general outbound
  connections

                                       21
Firewalls - Circuit Level
Gateway




                            22
Bastion Host
 highly secure host system
 runs circuit / application level
  gateways
 or provides externally accessible
  services
 potentially exposed to "hostile"
  elements
 hence is secured to withstand this
    ◦ hardened O/S, essential services, extra
      auth                                      23
Firewall Configurations




                          24
Firewall Configurations




                          25
Firewall Configurations




                          26
Access Control

 determines what resources users can
  access
 general model is that of access matrix
  with
    ◦ subject - active entity (user, process)
    ◦ object - passive entity (file or resource)
    ◦ access right – way object can be
      accessed
   can decompose by
    ◦ columns as access control lists
    ◦ rows as capability tickets
                                                   27
Access Control Matrix




                        28
Trusted Computer Systems
 information security is increasingly important
 have varying degrees of sensitivity of
  information
    ◦ military info classifications: confidential, secret, etc
 subjects (people or programs) have varying
  rights of access to objects (information)
 known as multilevel security
    ◦ subjects have maximum & current security level
    ◦ objects have a fixed security level classification
   want to consider ways of increasing
    confidence in systems to enforce these                       29
Bell LaPadula (BLP) Model

 has two key policies:
 no read up (simple security property)
    ◦ a subject can only read an object if the current
      security level of the subject dominates (>=) the
      classification of the object
   no write down (*-property)
    ◦ a subject can only append/write to an object if
      the current security level of the subject is
      dominated by (<=) the classification of the object


                                                           30
Reference Monitor




                    31
Summary
   have considered:
    ◦   firewalls
    ◦   types of firewalls
    ◦   configurations
    ◦   access control
    ◦   trusted systems




                             32
Firewall and its purpose

More Related Content

PPT
Firewall & its configurations
PPTX
Traditional Firewall vs. Next Generation Firewall
PPTX
CCNA PPT
PPTX
Hardware Security
PPT
Digital Forensic
PPT
Network management and security
PPTX
Firewall in Network Security
Firewall & its configurations
Traditional Firewall vs. Next Generation Firewall
CCNA PPT
Hardware Security
Digital Forensic
Network management and security
Firewall in Network Security

What's hot (20)

PPTX
Firewalls
PPTX
Firewall
PPT
Virtual private network
PPTX
PPTX
Firewall and Types of firewall
PPTX
PPTX
Network security
PDF
Network Security Fundamentals
PPTX
Network sniffers & injection tools
PPTX
Firewall ( Cyber Security)
PPSX
What is firewall
PPT
Network security
PPT
Network Security
PPTX
Vpn(virtual private network)
PPTX
IPSec VPN tunnel
PPTX
Firewalls in network security
PPTX
Virtual Private Network
PPTX
Introduction of firewall slides
Firewalls
Firewall
Virtual private network
Firewall and Types of firewall
Network security
Network Security Fundamentals
Network sniffers & injection tools
Firewall ( Cyber Security)
What is firewall
Network security
Network Security
Vpn(virtual private network)
IPSec VPN tunnel
Firewalls in network security
Virtual Private Network
Introduction of firewall slides
Ad

Viewers also liked (13)

PPTX
Firewall presentation
PPT
PPT
Presentation, Firewalls
PDF
Understanding Digital Certificates & Secure Sockets Layer
PPTX
Digital certificates and information security
PPT
Ssl (Secure Sockets Layer)
PPT
Lecture 4 firewalls
PPT
Secure Socket Layer (SSL)
PPTX
Ssl (Secure Socket Layer)
PPT
Secure Socket Layer
PPT
Introduction to Secure Sockets Layer
DOC
Firewall
 
PPTX
Firewall presentation
Firewall presentation
Presentation, Firewalls
Understanding Digital Certificates & Secure Sockets Layer
Digital certificates and information security
Ssl (Secure Sockets Layer)
Lecture 4 firewalls
Secure Socket Layer (SSL)
Ssl (Secure Socket Layer)
Secure Socket Layer
Introduction to Secure Sockets Layer
Firewall
 
Firewall presentation
Ad

Similar to Firewall and its purpose (20)

PPT
A firewall is a network security system that monitors and controls network tr...
PPTX
firewall
PPT
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
PDF
UNIT 4 Firewalls Information Security Sharad Institute
PPTX
Cyber Security - Firewall and Packet Filters
PPTX
Firewalls and packet filters
PPT
Firewall protection
PPTX
Firewall basics - types,architecture ,defination
PPT
Network Security Firewalls (description).ppt
PDF
Information security
PDF
firewalls on crypto graphy and network security
PDF
PDF
WT - Firewall & Proxy Server
PPT
Lecture in network security and mobile computing
PDF
ML13198A410.pdf
PDF
ML13198A410.pdf
PDF
We live in the earh seventy or eight years
PDF
ML13198A410.pdf
PDF
shivam sahu (firewall).pdfb jndvhjfvhjjf
A firewall is a network security system that monitors and controls network tr...
firewall
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
UNIT 4 Firewalls Information Security Sharad Institute
Cyber Security - Firewall and Packet Filters
Firewalls and packet filters
Firewall protection
Firewall basics - types,architecture ,defination
Network Security Firewalls (description).ppt
Information security
firewalls on crypto graphy and network security
WT - Firewall & Proxy Server
Lecture in network security and mobile computing
ML13198A410.pdf
ML13198A410.pdf
We live in the earh seventy or eight years
ML13198A410.pdf
shivam sahu (firewall).pdfb jndvhjfvhjjf

Recently uploaded (20)

PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
advance database management system book.pdf
PPTX
Education and Perspectives of Education.pptx
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
Module on health assessment of CHN. pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
Empowerment Technology for Senior High School Guide
PDF
English Textual Question & Ans (12th Class).pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Hazard Identification & Risk Assessment .pdf
PDF
International_Financial_Reporting_Standa.pdf
PDF
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PPTX
Computer Architecture Input Output Memory.pptx
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
advance database management system book.pdf
Education and Perspectives of Education.pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
AI-driven educational solutions for real-life interventions in the Philippine...
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Module on health assessment of CHN. pptx
Paper A Mock Exam 9_ Attempt review.pdf.
Environmental Education MCQ BD2EE - Share Source.pdf
Empowerment Technology for Senior High School Guide
English Textual Question & Ans (12th Class).pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Hazard Identification & Risk Assessment .pdf
International_Financial_Reporting_Standa.pdf
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Computer Architecture Input Output Memory.pptx
Journal of Dental Science - UDMY (2021).pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf

Firewall and its purpose

  • 4. + = But does fire + wall =firewall ??? Is this definition correct?? Well not exactly 
  • 5. Finally, welcome to last presentation of the 8th SEM CSE
  • 6. FIREWALLS Presented by- 1) Rohit Phulsunge 2) Satyendra Singh Naruka 3) Saurabh Maheswari 4) Sameer Pathak 5) Sandeep Suryawanshi
  • 7. So what exaclty is a firewall??  A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
  • 8. A diagram showing where a firewall can be placed.
  • 9. History  The term firewall originally referred to a wall intended to confine a fire or potential fire within a building  Later uses refer to similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment.
  • 10. What does firewall do?  a choke point of control and monitoring  interconnects networks with differing trust  imposes restrictions on network services ◦ only authorized traffic is allowed  auditing and controlling access ◦ can implement alarms for abnormal behavior  provide NAT & usage monitoring
  • 11. Firewall Limitations  cannot protect from attacks bypassing it ◦ E.g., sneaker net, utility modems, trusted organisations, trusted services (eg SSL/SSH)  cannot protect against internal threats ◦ eg disgruntled or colluding employees  cannot protect against transfer of all virus infected programs or files ◦ because of huge range of O/S & file types
  • 12. Firewalls – Packet Filters  simplest, fastest firewall component  foundation of any firewall system  examine each IP packet (no context) and permit or deny according to rules  hence restrict access to services (ports)  possible default policies ◦ that not expressly permitted is prohibited ◦ that not expressly prohibited is permitted 12
  • 13. Firewalls – Packet Filters 13
  • 14. Firewalls – Packet Filters 14
  • 15. Attacks on Packet Filters  IP address spoofing ◦ fake source address ◦ authenticate  source routing attacks ◦ attacker sets a route other than default ◦ block source routed packets  tiny fragment attacks ◦ split header info over several tiny packets ◦ either discard or reassemble before check 15
  • 16. Firewalls – Stateful Packet Filters  traditional packet filters do not examine higher layer context ◦ i.e., matching return packets with outgoing flow  stateful packet filters address this need  they examine each IP packet in context ◦ keep track of client-server sessions ◦ check each packet validly belongs to one  they are better able to detect bogus packets out of context 16
  • 17. TYPES OF FIREWALLS  Packet filtering Router  Application level gateway  Circuit level gateway 17
  • 18. Packet filtering Router Apply set of rules to IP packet *Rules for network packet  Source IP Address  Destination IP Address  Source & Destination transport level address  IP protocol field  Interface 18
  • 19. Application Level Gateway  have application specific gateway / proxy  has full access to protocol ◦ user requests service from proxy ◦ proxy validates request as legal ◦ then actions request and returns result to user ◦ can log / audit traffic at application level 19
  • 21. Firewalls - Circuit Level Gateway  relays two TCP connections  imposes security by limiting what such connections are allowed  once created usually relays traffic without examining contents  typically used when trust internal users by allowing general outbound connections 21
  • 22. Firewalls - Circuit Level Gateway 22
  • 23. Bastion Host  highly secure host system  runs circuit / application level gateways  or provides externally accessible services  potentially exposed to "hostile" elements  hence is secured to withstand this ◦ hardened O/S, essential services, extra auth 23
  • 27. Access Control  determines what resources users can access  general model is that of access matrix with ◦ subject - active entity (user, process) ◦ object - passive entity (file or resource) ◦ access right – way object can be accessed  can decompose by ◦ columns as access control lists ◦ rows as capability tickets 27
  • 29. Trusted Computer Systems  information security is increasingly important  have varying degrees of sensitivity of information ◦ military info classifications: confidential, secret, etc  subjects (people or programs) have varying rights of access to objects (information)  known as multilevel security ◦ subjects have maximum & current security level ◦ objects have a fixed security level classification  want to consider ways of increasing confidence in systems to enforce these 29
  • 30. Bell LaPadula (BLP) Model  has two key policies:  no read up (simple security property) ◦ a subject can only read an object if the current security level of the subject dominates (>=) the classification of the object  no write down (*-property) ◦ a subject can only append/write to an object if the current security level of the subject is dominated by (<=) the classification of the object 30
  • 32. Summary  have considered: ◦ firewalls ◦ types of firewalls ◦ configurations ◦ access control ◦ trusted systems 32