2
Most read
6
Most read
22
Most read
FIREWALLS
PRESENTED BY,
R.RAMADEVI,
II – M. SC(CS&IT).
UNDERSTANDING FIREWALLS
• Firewalls come in many different shapes and size and sometime the firewall
is actually a collection of several different computer.
• All communication must pass through the firewall.The effectiveness of the
firewall is greatly reduced if an alternative network routing path
• The firewall permits only traffic that is authorized.The firewall cannot be
relied upon to differentiate between authorized and unauthorized traffic
• The firewall can withstand attacks upon itself.The firewall is relied upon to
stop attacks and nothing is deployed to protect the firewall
• Firewall strengths and weaknesses:
Firewall are singular in purpose .compromises do not need to be made
between security and usability
Firewall are excellent auditor. Plenty of disk space or remote logging
capabilities
Firewall are very good at alerting appropriate people of specified events
• Firewall weaknesses:
Firewall are only as effective as the rules they are configured to enforce
Firewall cannot stop social engineering attacks or an authorized user
intentionally using their access for malicious
packet filters
Application gateways
Circuit _ level gateways
Stateful packet _ inspection engines
Combination of above is dynamic packet filter
FIREWALLS – PACKET FILTERS
FIREWALLS – PACKET FILTERS
• Simplest of components
• Uses transport-layer information only
• IP Source Address, Destination Address
• Protocol/Next Header (TCP, UDP, ICMP, etc)
• TCP or UDP source & destination ports
• TCP Flags (SYN, ACK, FIN, RST, PSH, etc)
• ICMP message type
• Examples
• DNS uses port 53
• No incoming port 53 packets except known trusted servers
SECURITY & PERFORMANCE OF PACKET FILTERS
• IP address spoofing
• Fake source address to be trusted
• Add filters on router to block
• Tiny fragment attacks
• Split TCP header info over several tiny packets
• Either discard or reassemble before check
• Degradation depends on number of rules applied at any point
• Order rules so that most common traffic is dealt with first
• Correctness is more important than speed
PORT NUMBERING
• TCP connection
• Server port is number less than 1024
• Client port is number between 1024 and 16383
• Permanent assignment
• Ports <1024 assigned permanently
• 20,21 for FTP 23 for Telnet
• 25 for server SMTP 80 for HTTP
FIREWALLS – STATEFUL PACKET FILTERS
• Traditional packet filters do not examine higher layer context
• ie matching return packets with outgoing flow
• Stateful packet filters address this need
• They examine each IP packet in context
• Keep track of client-server sessions
• Check each packet validly belongs to one
STATEFUL FILTERING
FIREWALL OUTLINES
• Packet filtering
• Application gateways
• Circuit gateways
• Combination of above is dynamic packet filter
FIREWALL GATEWAYS
• Firewall runs set of proxy programs
• Proxies filter incoming, outgoing packets
• All incoming traffic directed to firewall
• Policy embedded in proxy programs
• Two kinds of proxies
• Application-level gateways/proxies
• Circuit-level gateways/proxies
APPLICATION-LEVEL FILTERING
• Has full access to protocol
• user requests service from proxy
Need separate proxies for each service
• E.g., SMTP (E-Mail),NNTP (Net news)
FIREWALLS - CIRCUIT LEVEL GATEWAY,
SCREENED HOST ARCHITECTURE
SCREENED SUBNET USING TWO ROUTERS
DYNAMIC PACKET FILTERS
• Most common
• Provide good administrators protection and full transparency
• Network given full control over traffic
• Captures semantics of a connection
DYNAMIC PACKET FILTERS
DUAL HOMED HOST ARCHITECTURE
ADDITIONAL FIREWALL FUNCTIONS
Firewalls are ideally situated for performing several additional function
These function include network address transation(NAT) one ip address to
another details logging of traffic and encryption necessary communication
channel(VPNs)
NETWORK ADDRESS TRANSLATION(NAT)
• Static nat
• Dynamic nat
• port address translation
• Auditind and logging
• Virtual private network
NETWORK ADDRESS TRANSLATION(NAT)
• NAT is usually implemented in a firewall separately from the policy or rule
set
• It useful to remember that just because a NAT has been defind to translate
addresses between one host and another
THANK YOU

More Related Content

PPTX
Firewall presentation
PPTX
Firewall and its types and function
PPTX
cyber stalking
PPTX
Network security (vulnerabilities, threats, and attacks)
PPSX
Server training
PPTX
Introduction to Cryptography
PPS
Ip address
Firewall presentation
Firewall and its types and function
cyber stalking
Network security (vulnerabilities, threats, and attacks)
Server training
Introduction to Cryptography
Ip address

What's hot (20)

PPTX
Firewall and Types of firewall
PPT
Network Security
PPSX
Intrusion detection system
PDF
Network Security Fundamentals
PPTX
Intrusion detection and prevention system
PPTX
Firewalls
PPT
firewall.ppt
PPTX
Network Security ppt
PPTX
Network security
PPTX
Network security - Defense in Depth
PPTX
Firewall presentation
PPT
Firewall Security Definition
PPT
Secure Socket Layer
PPTX
Network security
PPTX
Introduction to Network Security
PPTX
IT Security Presentation
PPTX
Network Security
PPTX
Intrusion detection
 
PPTX
Network Security and Firewall
Firewall and Types of firewall
Network Security
Intrusion detection system
Network Security Fundamentals
Intrusion detection and prevention system
Firewalls
firewall.ppt
Network Security ppt
Network security
Network security - Defense in Depth
Firewall presentation
Firewall Security Definition
Secure Socket Layer
Network security
Introduction to Network Security
IT Security Presentation
Network Security
Intrusion detection
 
Network Security and Firewall
Ad

Similar to Firewall in Network Security (20)

PPTX
PPT
Network security
PPT
Advance firewalls
PPT
Unit 5.3_Firewalls (1).ppt
PPT
Firewalls.ppt
PPTX
Firewall ( Cyber Security)
PPT
Firewalls presentation powerpoint powepoint
PPT
Firewalls.ppt
PPT
Network related Firewalls security funtions
PPT
Firewalls.ppt
PPT
Firewalls.ppt
PPT
Firewalls (1).ppt
PPT
Firewalls presentation tells about the fire walls
PPT
Firewalls.ppt
PPTX
Cyber security tutorial2
PPTX
Section c group2_firewall_ final
PPTX
Network defenses
PPTX
PPTX
Firewall Design and Implementation
Network security
Advance firewalls
Unit 5.3_Firewalls (1).ppt
Firewalls.ppt
Firewall ( Cyber Security)
Firewalls presentation powerpoint powepoint
Firewalls.ppt
Network related Firewalls security funtions
Firewalls.ppt
Firewalls.ppt
Firewalls (1).ppt
Firewalls presentation tells about the fire walls
Firewalls.ppt
Cyber security tutorial2
Section c group2_firewall_ final
Network defenses
Firewall Design and Implementation
Ad

More from lalithambiga kamaraj (20)

PPTX
Data Compression in Multimedia
PPTX
Data CompressionMultimedia
PPTX
Digital Audio in Multimedia
PPTX
Network Security: Physical security
PPTX
Graphs in Data Structure
PPTX
Package in Java
PPTX
Exception Handling in Java
PPTX
Data structure
PPTX
Digital Image Processing
PPTX
Digital Image Processing
PPTX
Estimating Software Maintenance Costs
PPTX
PPTX
Digital Components
PPTX
Deadlocks in operating system
PPTX
Io management disk scheduling algorithm
PPTX
Recovery system
PPTX
File management
PPTX
Preprocessor
PPTX
PPTX
Managing console of I/o operations & working with files
Data Compression in Multimedia
Data CompressionMultimedia
Digital Audio in Multimedia
Network Security: Physical security
Graphs in Data Structure
Package in Java
Exception Handling in Java
Data structure
Digital Image Processing
Digital Image Processing
Estimating Software Maintenance Costs
Digital Components
Deadlocks in operating system
Io management disk scheduling algorithm
Recovery system
File management
Preprocessor
Managing console of I/o operations & working with files

Recently uploaded (20)

PPTX
Reproductive system-Human anatomy and physiology
PDF
Laparoscopic Dissection Techniques at WLH
PPTX
Power Point PR B.Inggris 12 Ed. 2019.pptx
PPTX
4. Diagnosis and treatment planning in RPD.pptx
PDF
anganwadi services for the b.sc nursing and GNM
PDF
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
PDF
Chevening Scholarship Application and Interview Preparation Guide
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PPTX
IT infrastructure and emerging technologies
PPTX
Why I Am A Baptist, History of the Baptist, The Baptist Distinctives, 1st Bap...
PDF
Compact First Student's Book Cambridge Official
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
PDF
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PPTX
Diploma pharmaceutics notes..helps diploma students
PDF
Hospital Case Study .architecture design
PDF
The TKT Course. Modules 1, 2, 3.for self study
PDF
FYJC - Chemistry textbook - standard 11.
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
Reproductive system-Human anatomy and physiology
Laparoscopic Dissection Techniques at WLH
Power Point PR B.Inggris 12 Ed. 2019.pptx
4. Diagnosis and treatment planning in RPD.pptx
anganwadi services for the b.sc nursing and GNM
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
Chevening Scholarship Application and Interview Preparation Guide
Disorder of Endocrine system (1).pdfyyhyyyy
IT infrastructure and emerging technologies
Why I Am A Baptist, History of the Baptist, The Baptist Distinctives, 1st Bap...
Compact First Student's Book Cambridge Official
UNIT_2-__LIPIDS[1].pptx.................
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
0520_Scheme_of_Work_(for_examination_from_2021).pdf
Diploma pharmaceutics notes..helps diploma students
Hospital Case Study .architecture design
The TKT Course. Modules 1, 2, 3.for self study
FYJC - Chemistry textbook - standard 11.
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt

Firewall in Network Security

  • 2. UNDERSTANDING FIREWALLS • Firewalls come in many different shapes and size and sometime the firewall is actually a collection of several different computer. • All communication must pass through the firewall.The effectiveness of the firewall is greatly reduced if an alternative network routing path • The firewall permits only traffic that is authorized.The firewall cannot be relied upon to differentiate between authorized and unauthorized traffic
  • 3. • The firewall can withstand attacks upon itself.The firewall is relied upon to stop attacks and nothing is deployed to protect the firewall • Firewall strengths and weaknesses: Firewall are singular in purpose .compromises do not need to be made between security and usability Firewall are excellent auditor. Plenty of disk space or remote logging capabilities Firewall are very good at alerting appropriate people of specified events
  • 4. • Firewall weaknesses: Firewall are only as effective as the rules they are configured to enforce Firewall cannot stop social engineering attacks or an authorized user intentionally using their access for malicious packet filters Application gateways Circuit _ level gateways Stateful packet _ inspection engines Combination of above is dynamic packet filter
  • 6. FIREWALLS – PACKET FILTERS • Simplest of components • Uses transport-layer information only • IP Source Address, Destination Address • Protocol/Next Header (TCP, UDP, ICMP, etc) • TCP or UDP source & destination ports • TCP Flags (SYN, ACK, FIN, RST, PSH, etc) • ICMP message type • Examples • DNS uses port 53 • No incoming port 53 packets except known trusted servers
  • 7. SECURITY & PERFORMANCE OF PACKET FILTERS • IP address spoofing • Fake source address to be trusted • Add filters on router to block • Tiny fragment attacks • Split TCP header info over several tiny packets • Either discard or reassemble before check • Degradation depends on number of rules applied at any point • Order rules so that most common traffic is dealt with first • Correctness is more important than speed
  • 8. PORT NUMBERING • TCP connection • Server port is number less than 1024 • Client port is number between 1024 and 16383 • Permanent assignment • Ports <1024 assigned permanently • 20,21 for FTP 23 for Telnet • 25 for server SMTP 80 for HTTP
  • 9. FIREWALLS – STATEFUL PACKET FILTERS • Traditional packet filters do not examine higher layer context • ie matching return packets with outgoing flow • Stateful packet filters address this need • They examine each IP packet in context • Keep track of client-server sessions • Check each packet validly belongs to one
  • 11. FIREWALL OUTLINES • Packet filtering • Application gateways • Circuit gateways • Combination of above is dynamic packet filter
  • 12. FIREWALL GATEWAYS • Firewall runs set of proxy programs • Proxies filter incoming, outgoing packets • All incoming traffic directed to firewall • Policy embedded in proxy programs • Two kinds of proxies • Application-level gateways/proxies • Circuit-level gateways/proxies
  • 13. APPLICATION-LEVEL FILTERING • Has full access to protocol • user requests service from proxy Need separate proxies for each service • E.g., SMTP (E-Mail),NNTP (Net news)
  • 14. FIREWALLS - CIRCUIT LEVEL GATEWAY, SCREENED HOST ARCHITECTURE
  • 15. SCREENED SUBNET USING TWO ROUTERS
  • 16. DYNAMIC PACKET FILTERS • Most common • Provide good administrators protection and full transparency • Network given full control over traffic • Captures semantics of a connection
  • 18. DUAL HOMED HOST ARCHITECTURE
  • 19. ADDITIONAL FIREWALL FUNCTIONS Firewalls are ideally situated for performing several additional function These function include network address transation(NAT) one ip address to another details logging of traffic and encryption necessary communication channel(VPNs)
  • 20. NETWORK ADDRESS TRANSLATION(NAT) • Static nat • Dynamic nat • port address translation • Auditind and logging • Virtual private network
  • 21. NETWORK ADDRESS TRANSLATION(NAT) • NAT is usually implemented in a firewall separately from the policy or rule set • It useful to remember that just because a NAT has been defind to translate addresses between one host and another