Firewallpresentation 100826052003-phpapp02

devidasshinde2 53 views 19 slides Nov 29, 2018
Slide 1
Slide 1 of 19
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19

About This Presentation

Firewall of the Presentation of the Academic of the year


Slide Content

PRESENTERS : -
GAGANDEEP SINGH
KARANDEEP VOHRA
PUNEETPAL SINGH
Presentation :’Firewalls’
1

Table of Contents
2
INTRODUCTION
HOW FIREWALL WORKS
TYPES OF FIREWALLS
MAKING THE FIREWALL FIT
TESTING A FIREWALL CONFIGURATION
CONCLUSION
REFERENCES

Introduction
Is hardware, software, or a combination of both
used to prevent unauthorized programs or Internet
users from accessing a private network and/or a
single computer.
3

Hardware vs. Software Firewalls
4
Hardware Firewalls
Protect an entire network
Implemented on the router level
Usually more expensive, harder to configure
Software Firewalls
Protect a single computer
Usually less expensive, easier to configure

How does a software firewall work?
5
Inspects each individual “packet” of data as it arrives
at either side of the firewall
Determines whether it should be allowed to pass
through or if it should be blocked

Firewall Rules
6
Allow –traffic that flows automatically because it
has been deemed
Block –traffic that is blocked because it has been
deemed dangerous to your computer
Ask –asks the user whether or not the traffic is
allowed to pass through

What Can a Firewall Do?
Focus for security decisions
Stop hackers from accessing your computer
Can enforce security policy
Protects your personal information
Limits your exposure
Blocks “pop up” ads and certain cookies
Can log Internet activity efficiently
Determines which programs can access the Internet
7

What Can't a Firewall Do?
Can't protect you against malicious insiders
Can't protect you against connections that don't go
through it
Can't protect against completely new threats
Can't protect against viruses
8

Types of Firewalls
Packet Filtering Firewall
Application level Gateway
Circuit level gateway
9

Architectures for Firewall
Single-Box Architecture
10

Screened Host Architecture
11

Making The Firewall Fit
IP address
Domain names
Protocols
Ports
12

What It Protects You From
Remote login
SMTP session hijacking
Operating system bugs
Spam
E-mail bombs
Source routing
13

Security Strategies implemented
Default Deny
Prohibit all communication that is not expressly permitted
Default Permit
Permit all communication that is not explicitly prohibited
Least Privilege
reduces the authorization level at which various actions are
performed
Defense in Depth
security approach whereby each system on the network is secured
to the greatest possible degree
Choke Point
forces attackers to use a narrow channel to bypass the network
14

Testing a Firewall Configuration
15
•A faster and easier method is available with the
Linux firewall
implementation
•Allows you to manually generate tests
•Suppose our local network is 172.16.1.0
•And we allow only TCP connections

Example
16

# ipchains-C forward -p tcp-s 172.16.1.0 1025 -d 44.136.8.2 80 -ieth0
accepted
# ipchains-C forward -p tcp-s 172.16.2.0 1025 -d 44.136.8.2 80 -ieth0
denied
# ipchains-C forward -p udp-s 172.16.1.0 1025 -d 44.136.8.2 80 -ieth0
denied
# ipchains-C forward -p tcp-s 172.16.1.0 1025 -d 44.136.8.2 23 -ieth0
denied
source Destination
Wrong
Wrong
Wrong

REFRENCES
17
www.howstuffworks.com
www.securityfocus.com
www.firewall.com

18
Conclusion

TESTING A FIREWALL CONFIGURATION
THANKU
19