I NTRODUCTION TO F IREWALLS. O VERVIEW OF F IREWALLS As the name implies, a firewall acts to provide secured access between two networks A firewall may.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

Firewall Lalitha Jammalamadaka. Agenda 1. Introduction 2.Types of firewalls 3.How a software firewall works 4.Methods to control traffic 5.Making the.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Firewalls and Intrusion Detection Systems
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Circuit & Application Level Gateways CS-431 Dick Steflik.
Introduction to Firewalls © N. Ganesan, Ph.D.. Overview.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
A Brief Taxonomy of Firewalls
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Chapter 13 – Network Security
Network Security Group Members Jason Vaughan Anna Libman Daliah Stephan James Doliente Alan Yuen.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
CONTENTS  INTRODUCTION.  KEYWORDS  WHAT IS FIREWALL ?  WHY WE NEED FIREWALL ?  WHY NOT OTHER SECURITY MECHANISM ?  HOW FIREWALL WORKS ?  WHAT IT.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
N ETWORKING C OMPONENTS A-3 LTEC 4550 by Joe Garcia.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Proxy Servers & Firewalls. What is proxy ? What is proxy ? Main purpose of using proxies Main purpose of using proxies How a proxy works ? How a proxy.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Security fundamentals Topic 10 Securing the network perimeter.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
A Network Security -Firewall Bruce Turin.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
Course Title: WEB SECURITY Chapter No: 01 “Introduction to Web-Security” 1 Maiwand Institute Of Higher Education.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Important of Firewall Security in LAN Presented by: Guo Chean Ooi.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Network System Security - Task 2. Russell Johnston.
Defining Network Infrastructure and Network Security Lesson 8.
S ECURITY APPLIANCES Module 2 Unit 2. S ECURE NETWORK TOPOLOGIES A topology is a description of how a computer network is physically or logically organized.
Introduction to Firewalls
CONNECTING TO THE INTERNET
Network Security Marshall Leitem 11/30/04
Prepared By : Pina Chhatrala
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
Firewalls.
Digital Pacman: Firewall Edition
Firewalls Purpose of a Firewall Characteristic of a firewall
FIREWALL By Abhishar Baloni I.D
Firewalls Jiang Long Spring 2002.
Fire-wall.
FIREWALL.
Firewall Installation
Presentation transcript:

I NTRODUCTION TO F IREWALLS

O VERVIEW OF F IREWALLS As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as a standalone hardware device or in the form of a software on a client computer or a proxy server The two types of firewall are generally known as the hardware firewall and the software firewall

F IREWALLS IN P RACTICE A computer may be protected by both a hardware and a software firewall

M ODE OF O PERATION A firewall that stands in between two networks will inspect a packet that is ready to pass between the networks and allow or block the packet based on the rules set for the firewall to operate

G ENERAL F IREWALL F EATURES Port Control Network Address Translation Application Monitoring (Program Control) Packet Filtering

A DDITIONAL F IREWALL F EATURES Data encryption Hiding presence Reporting/logging virus protection Pop-up ad blocking Cookie digestion Spy ware protection etc.

V IRUSES AND F IREWALLS In general, firewalls cannot protect against viruses An anti-virus software is needed for that purpose However, many security suites such as those offered by MacAfee and Norton offer the complete protection Some software firewalls such as Zone Alarm Pro may contain limited virus protection features

A R ULE OF T HUMB Use the best firewall and virus protection although each may originate from a different company

ISO-OSI L AYERS OF O PERATION

F IREWALL L AYER OF O PERATION Network Layer Application Layer

N ETWORK L AYER Makes decision based on the source, destination addresses, and ports in individual IP packets. Based on routers Has the ability to perform static and dynamic packet filtering and stateful inspection.

S TATIC & D YNAMIC F ILTERING Static Packet Filtering looks at minimal information in the packets to allow or block traffic between specific service ports Offers little protection. Dynamic Packet Filtering maintains a connection table in order to monitor requests and replies.

S TATEFUL I NSPECTION Compares certain key parts of the packet to a database of trusted information. Incoming information is compared to outgoing information characteristics. Information is allowed through only If comparison yields a reasonable match.

A PPLICATION L AYER They are generally, hosts running proxy servers which perform logging and auditing of traffic through the network. Logging and access control are done through software components.

F IREWALL S CENARIO Microsoft Internet Security and Acceleration (ISA) Server as a Dedicated Server

N ETWORK C ONFIGURATION Single Computer Small Office Network Less than 250 Clients IP Network Protocol Demand Dial Connectivity Larger Organization Array of ISA Server Internet ISA Server Local Area Network

H ARDWARE F IREWALL What is it?  It is just a software firewall running on a dedicated piece of hardware or specialized device.  Basically, it is a barrier to keep destructive forces away from your property.  You can use a firewall to protect your home network and family from offensive Web sites and potential hackers.

H ARDWARE F IREWALL (C ONT.) What it does !  It is a hardware device that filters the information coming through the Internet connection into your private network or computer system.  An incoming packet of information is flagged by the filters, it is not allowed through.

H ARDWARE F IREWALL (C ONT.) An example !

H ARDWARE F IREWALL (C ONT.) Firewalls use:  Firewalls use one or more of three methods to control traffic flowing in and out of the network: Packet filtering Proxy service State-full inspection

H ARDWARE F IREWALL (C ONT.) What it protects you from: Remote logins Application backdoors SMTP session hijacking Addresses Spam Denial of service bombs  sent 1000’s of times till mailbox is full  Macros  Viruses

S OME H ARDWARE F IREWALL M ANUFACTURERS DLink Linksys CISCO

S OFTWARE F IREWALL What it is? Also called Application Level Firewalls It is firewall that operate at the Application Layer of the OSI They filter packets at the network layer It Operating between the Datalink Layer and the Network Layer It monitor the communication type (TCP, UDP, ICMP, etc.) as well as the origination of the packet, destination port of the packet, and application (program) the packet is coming from or headed to.

S OFTWARE F IREWALL (C ONT.) How does software firewall works ?

S OFTWARE F IREWALLS Firewall for Windows Zone Alarm Winroute Trojan Trap - Trojan Horse Firewall for Linux Iptables Firewall for Mac Netbarrier

B ENEFITS OF F IREWALL -S UMMARY Prevent intrusion Choke point for security audit Reduce attacks by hackers Hide network behind a single IP address Part of total network security policy