You are on page 1of 11

FIREWALL

PRESENTED BY: NILOTPAL SAHARIAH


ROLL NO: 16
FIREWALL
• It is network security system that
• Monitors incoming and outgoing network
• Controls incoming and outgoing network
• It establishes a barrier between a trusted internal network and
untrusted external network.
• They are an integral part of a comprehensive security framework for
network

An illustration of where a firewall


would be located in a network
Functionalities of a firewall
• Prevents unauthorized access to and from a private network
• Firewalls are tools that can be used to enhance the security of
computers connected to a network
• It absolutely isolates the computer from internet
• Using a “wall of code”
• That inspects each individual data packet as it arrives at the either side of the firewall –
inbound or outbound from the computer
• To determine whether it should be allowed to pass or to be blocked
CATEGORIES OF FIREWALLS
1. Network based firewall
1. Are positioned on the gateway computers of LANs, WANs
2. They are either software appliances running on general purpose hardware
or hardware base firewall computer appliances
2. Host based firewall
1. Positioned on the network node itself and control network traffic in and out
of those machines
TYPES OF FIREWALLS
1. Packet-filtering firewalls
2. Stateful inspection firewalls
3. Circuit-level gateways(proxy firewalls)
4. Application-level gateways
PACKET-FILTERING FIREWALLS
• Most basic and oldest type of firewall architecture
• It creates a checkpoint at a traffic router or switch
• Performs simple check on the packets coming through the router
• Inspecting information such as destination and originating IP address, port
number, and other surface level information
• If the information packet doesn’t pass the inspection
• It is dropped
CIRCUIT-LEVEL GATEWAYS
• It quickly and easily approve or deny traffic without consuming
significant computing resources
• Works by verifying the transmission control protocol(TCP) handshake
• TCP handshake check is designed to make sure that the session the
packet is from is legitimate
• Does not check the packet itself
• If the packet had malware but had the right TCP handshake-it would pass
right through
STATEFUL INSPECTION FIREWALLS
• Combines both packet inspection and TCP handshake verification
• To create a level of protection greater than either two architectures could
provide alone
• Puts more strain on the computing resources
• Slow down the transfer of legitimate packets
PROXY FIREWALLS (APPLICATION-LEVEL
GATEWAYS)
• Operates at the application layer to filter incoming traffic between the network and the traffic
source
• Rather than letting traffic connect directly
• Proxy firewall first establishes a connection to the source and inspects the incoming data
packet
• Check is similar to the stateful inspection firewall
• Proxy firewalls may also perform deep-layer packet inspections
• Checking the actual content of the packet to verify that it contains no malware
• Once check is complete and the packet is approved to connect to the destination, the proxy sends
it off
• This creates an extra layer of separation between the client and the individual devices on the
network
• Drawback is that they can create significant slowdown because of the extra steps in the data
packet transferal process
BIBLIOGRAPHY
• https://personalfirewall.comodo.com/what-is-firewall.html
• https://www.cisco.com/c/en_in/products/security/firewalls/what-is-
a-firewall.html
• https://en.wikipedia.org/wiki/Firewall_(computing)#Types
• https://www.compuquip.com/blog/the-different-types-of-firewall-
architectures

You might also like