![Page 1: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/1.jpg)
FIREWALL
By : Himanshu Mishra
Nimish Agarwal
CPSC 624
![Page 2: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/2.jpg)
What is a Firewall?
A system designed to prevent unauthorized access to or from a private network.
It must have at least two network interfaces.
![Page 3: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/3.jpg)
What Firewall does?
Examines all traffic routed between the two networks.
Filters both inbound and outbound traffic.
Used to log all attempts to enter the private network.
![Page 4: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/4.jpg)
![Page 5: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/5.jpg)
Types
The several classifications of firewalls depends on
Where the communication is taking place.
Where the communication is intercepted.
The state that is being traced.
![Page 6: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/6.jpg)
Network Layers and Packet Filters
Examines five characteristics of a packet.
Operates on Level 3 i.e. Network Layer of OSI Model.
Has rules by default or defined by the firewall administrator.
Packets either allowed, rejected or dropped.
![Page 7: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/7.jpg)
Application Layer
Operates on Layer 7 .i.e Application Layer of OSI Model.
Intercept all packets traveling to or from an application.
Adds extra latency.
Application filters apply filtering rules on a per process basis instead of filtering connections on a per port basis
![Page 8: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/8.jpg)
Proxies
![Page 9: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/9.jpg)
Proxies contd
Every packet stopped, examined and compared.
Re-created and sent.
Drawback: Separate proxy application written for each applicatione.g. An HTTP proxy for web traffic, an FTP proxy for file
transfers, a Gopher proxy for Gopher traffic
![Page 10: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/10.jpg)
Network Address Translation
Allows a single device to act as an agent between the Internet (or "public network") and a local (or "private") network.
Nat sits between an internal network and the rest of the world.
Extensive filtering and traffic logging.
![Page 11: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/11.jpg)
Nat vs Proxies
Nat sometimes confused with Proxies.
Nat is transparent.
Proxy server works at Level 4 or higher in OSI Model.
Proxy servers are slower.
![Page 12: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/12.jpg)
Nat vs Proxies contd
![Page 13: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/13.jpg)
Firewall Configuration
Firewalls are customizable.
IP address. Domain names. Protocols. Ports. Specific words or phrases.
![Page 14: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/14.jpg)
IP Address and Domain names
IP address: Each machine has unique IP address. Typical IP address : 216.27.61.137 e.g. certain IP
reading too many files can be blocked.
Domain Names: Hard to remember string of numbers. Since IP addresses change, hence human-readable
names.
![Page 15: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/15.jpg)
Protocols
Protocol is the pre-defined way that someone who wants to use a service talks with that service.
Protocols are often text.
Some common protocols:IP TCP HTTP FTP UDPICMP SMTP SNMP TELNET
Company might set one or two protocols on a particular machine.
![Page 16: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/16.jpg)
Ports and Specific words and phrases
Ports: Server machine makes its services available to the
Internet using numbered ports. For e.g. if a server machine is running a Web (HTTP)
server and an FTP server, the Web server would typically be available on port 80, and the FTP server would be available on port 21.
Specific words and phrases: sniff each packet of information for an exact match of the
text listed in the filter
![Page 17: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/17.jpg)
Hardware firewall
Advantages: Easy to set up. Pre-defined set of rules. Consumes no resources on the computer and is faster. Works on a network.
Disadvantages: Not dynamic and will block everything defined in filter.
![Page 18: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/18.jpg)
Software Firewall
Advantages: Easy to install. Customizable. Upgradable.
Disadvantages: Protects single computer on which they are installed. Eats resources and slows down.
![Page 19: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/19.jpg)
Why Firewall Security?To prevent against following threats:
Remote login Application backdoors SMTP session hijacking Operating system bugs Denial of service E-mail bombs Macros Viruses Spam Redirect bombs Source routing
![Page 20: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/20.jpg)
Conclusion
Use both hardware and software for maximum protection
Each offers different but much-needed security features and benefits.
Updating and testing are both essentially important to ensure it is connected and working properly.
![Page 21: By : Himanshu Mishra Nimish Agarwal CPSC 624. A system designed to prevent unauthorized access to or from a private network. It must have at least](https://reader030.vdocuments.us/reader030/viewer/2022032804/56649e445503460f94b37cc9/html5/thumbnails/21.jpg)
Thank You
References: http://www.webopedia.com/DidYouKnow/Hardware_Softw
are/2004/firewall_types.asp http://en.wikipedia.org/wiki/Firewall_(computing) http://computer.howstuffworks.com/firewall.htm http://computer.howstuffworks.com/nat5.htm