0% found this document useful (0 votes)
7 views25 pages

Firewalls

The document is a presentation by Simpy Kumari on the topic of Firewalls, covering their types, environments, and future developments. It highlights the importance of firewalls in controlling network traffic and providing security for private networks. The presentation also discusses various firewall categories and their functionalities, emphasizing the need for ongoing advancements in firewall technology.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views25 pages

Firewalls

The document is a presentation by Simpy Kumari on the topic of Firewalls, covering their types, environments, and future developments. It highlights the importance of firewalls in controlling network traffic and providing security for private networks. The presentation also discusses various firewall categories and their functionalities, emphasizing the need for ongoing advancements in firewall technology.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 25

 Name :- Simpy Kumari

 Branch :- IT,B
 Year :- Final (4th )
 University Roll :- 12500219064
 College Roll :- 194078318
 I would like to express my special thanks of
gratitude to my teacher who gave me the
golden opportunity to do this wonderful
Presentation on the topic Firewall.

which also helped me in doing a lot of


Research and i came to know about so
many new things I am really thankful .
with Due Regards
Simpy Kumari.
IT - B
 Introduction
 Firewall Environments
 Type of Firewalls
 Future of Firewalls
 Conclusion
 Firewalls control the flow of network
traffic
 Firewalls have applicability in networks
where there is no internet connectivity
 Firewalls operate on number of layers
 Can also act as VPN gateways
 Active content filtering technologies
 There are different types of environments
where a firewall can be implemented.
 Simple environment can be a packet filter
firewall
 Complex environments can be several
firewalls and proxies
 Can be created out of a network
connecting two firewalls
 Boundary router filter packets protecting
server
 First firewall provide access control and
protection from server if they are hacked
 VPN is used to provide secure network
links across networks
 VPN is constructed on top of existing
network media and protocols
 On protocol level IPsec is the first choice
 Other protocols are PPTP, L2TP
 An intranet is a network that employs the
same types of services, applications, and
protocols present in an Internet
implementation, without involving
external connectivity
 Intranets are typically implemented
behind firewall environments.
 Extranet is usually a business-to-business
intranet
 Controlled access to remote users via
some form of authentication and
encryption such as provided by a VPN
 Extranets employ TCP/IP protocols, along
with the same standard applications and
services
 Firewalls fall into four broad categories
 Packet filters
 Circuit level
 Application level
 Stateful multilayer
 Work at the network level of the OSI
model
 Each packet is compared to a set of
criteria before it is forwarded
 Packet filtering firewalls is low cost and
low impact on network performance
 Circuit level gateways work at the session
layer of the OSI model, or the TCP layer
of TCP/IP
 Monitor TCP handshaking between
packets to determine whether a
requested session is legitimate.
 Application level gateways, also called
proxies, are similar to circuit-level
gateways except that they are
application specific
 Gateway that is configured to be a web
proxy will not allow any ftp, gopher,
telnet or other traffic through
 Stateful multilayer inspection firewalls
combine the aspects of the other three
types of firewalls
 They filter packets at the network layer,
determine whether session packets are
legitimate and evaluate contents of
packets at the application layer
 Firewalls will continue to advance as the
attacks on IT infrastructure become more
and more sophisticated
 More and more client and server
applications are coming with native
support for proxied environments
 Firewalls that scan for viruses as they
enter the network and several firms are
currently exploring this idea, but it is not
yet in wide use
 It is clear that some form of security for
private networks connected to the
Internet is essential
 A firewall is an important and necessary
part of that security, but cannot be
expected to perform all the required
security functions.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy