Professional Documents
Culture Documents
Firewall
Firewall
Firewall
Kenneth Ingham
Consulting
And
STEPHANIE FORREST
Presentation by :
Abdullah Rahim
Introduction
History of Firewall
Purposes of Firewall
Types of Firewall
Definition
A logical barrier designed to prevent
unauthorized or unwanted
communications between sections of
a computer network
•Firewalls are frequently used to prevent
unauthorized Internet users from
accessing private networks connected to
the Internet, especially intranets.
•All messages entering or leaving the
intranet pass through the firewall, which
examines each message and blocks those
that do not meet the specified security
criteria.
History of Firewall
•Firewall technology first began to
emerge in the late 1980s when the
Internet was still a fairly new technology
in terms of its global usage and
connectivity.
•The original idea was formed in response
to a number of major internet security
breaches, which occurred in late 1980’s.
•In 1988, The Morris Worm was the first
large scale attack on Internet security,
which the online community neither
expected, nor were prepared for.
•Firewalls can be implemented in both
hardware and software, or a
combination of both.
The first firewall was developed by
Bill Cheswick called “Evening with
Berferd" [1992] in which he set up a
simple electronic “jail" for an
attacker. In this jail, the attacker was
unable to affect the real system but
was left with the impression that he
or she had successfully broken it.
•Content Filtering
•Data Caching
Internet Connection
Sharing
With Network Address Translation (NAT) enabled
Firewalls, a single Internet connection can be
shared by multiple users.
NAT works by taking network requests from
computer s on the local network and sending them
out as if they came directly from the firewall itself.
When the responses come back to firewall, it
remembers who made request for that data, and
gives response back to that computer.
This may seem similar to how proxies work, but
NAT works at a much more general level, which
enables any type of network traffic to be sent and
received using this method, not just specific
protocols such as HTTP and FTP.
Virtual Private
Networking
•Firewalls with virtual private
networking (VPN) features can increase
security between trusted computers by
encrypting the data sent through
untrusted network paths (such as the
Internet ).
•Virtual Private Networking works by
placing
VPN- aware firewalls at the entry points
of all
sub - networks that are to be connected
together to create the one large
network.
•When requests are sent from a local
computer to connect to another
computer, the firewall recognizes the
Types of Firewall
There are two types of firewalls
•Standalone Hardware Firewalls.
•Software-Based Firewalls.
Hardware Firewalls
Standalone hardware firewalls are
computer network devices built
specifically for firewall purposes.
They are typically designed to be used in
large computer networks, such as those
found at universities or businesses.
Standalone Hardware Firewalls are
typically administered by a direct serial
connection between the firewall and a
simple text - based terminal computer.
Hardware firewalls can be great for large
networks, they may not be practical
when only a few computers need to be
secured.
Software Based
Firewalls
Software - based firewalls perform the
same functions as hardware – based
firewalls, but instead of working as
standalone devices on the network,
they run on computers connected to
the network.
Norton Personal Firewall, BlackIce,
Zonealarm are the few examples of
Software Firewall. There are open
source firewalls available such as
ipchanes and iptables for unix based