Sei sulla pagina 1di 18

Cover

FIREWALLS
Introduction

 It is a network security system.

 Is hardware,
. software or combination
of both.

 Used to prevent unauthorized


programs or Internet users from
accessing a private network and/or a
single computer.
Firewall rules

 Allow
Traffic that flows automatically because it has been deemed

 Block
Traffic that is blocked because it has been deemed dangerous to your
computer

 Ask
Asks the user whether or not the traffic is allowed to pass through
What Can a Firewall Do?

Focus for security decisions


 Stop hackers from accessing your computer

Can enforce security policy


 Protects your personal information

Limits your exposure


 Blocks “pop up” ads and certain coookies

Can log Internet activity effciently


 Determines which programs can access the Internet
What Can't a Firewall Do?

 Can't protect you against malicious insiders

 Can't protect you against connections that don't go through it

 Can't protect against completely new threats

 Can't protect against viruses


Mode of Operation

 A firewall that stands in


between two networks will
inspect a packet that is ready to
pass between the networks and
allow or block the packet based01 02
on the rules set for the firewall
to operate.

03 04
Firewall Features

 Port Control  Hiding presence

 Newtwork Address Translation  Reporting/ Logging

 Application  E-mail virus protection


Monitoring(Program Control)
 Pop-up ad blocking
 Packet Filtering
 Cookie digestion
 Data encryption

 Spy ware protection


Hardware Firewall

 It is just a software firewall running on


a dedicated piece of hardware or
spcialized device.

 Basically, it is a barrier to keep


dastructive forces away from your
property.

 You can use a firewall to protect your


home network and family from
offensive web sites and potential
hackers.
What it does!

 It is a hardware device that filters the


information coming through the
internet connection into your private
network or computer system.

 An incoming packet of information is


flagged by the filters, it is not allowed
through.
Firewalls Use

 Firewalls use one or more of three methods to control traffic


flowing in and out of network:
 Packet flitering
 Proxy service
 State-full inspection
 Packet Filtering
Packets are analyzed againt a set of filters

 Proxy service
Information from the internet is retrieved by the firewall and then sent to the
requesting system and vice versa.

 State-full inspection
It compares certain key parts of the packet to a database of trusted information.
Information traveling from inside to the outside is monitoring for specific
definig characteristics, then incoming information is compared to these
characteristics.
What it protects you from

 Remote logins  Denial of service

 Application backdoors  Macros

 SMTP session hijacking  Virus

 E-mail address  E-mail bombs

 Spam
Software Firewall

 Also called Application Level Firewalls

 It is firewall that operate at the Application Layer of the OSI

 They filter packets at the network layer

 It operating between the Datalink Layer and the Network Layer

 It monitor the communication type (TCP, UDP, ICMP, etc.) as well as the
origination of the packet, destination port of the packet, and application
(program) the packet is coming from or headed to.
How does software firewall works?
Benefit of using application firewalls

 Allow direct connections between client and host

 Ability to report to intrusion detection software

 Equipped with certain level of logic

 Make intelligent decisions

 Configured to check for known vulnerability

 Large amount of logging


Hardware vs. Software Firewalls

Hardware Firewalls
 Protect an entire network
 Implement on the router level
 Usually more expensive
 Harder to configure

Software Firewalls
 Protect single computer
 Usually less espensive
 Easier to configure
List of firewalls on OS
Linux Operating System

 Lptables  EBox platform


 Lpcop  Monowall
 Shorewall  Clear os
 UFW-Uncomplicated Firewall  Pfsence
 OpenBSD and PF  Smoothwall Advanced

Windows Operating System

 Zone Alarm firewall


 Shardaccess
 Mpssvc
Thank you

Potrebbero piacerti anche