You are on page 1of 22


Kenneth Ingham
Presentation by :
 Abdullah Rahim
 Introduction
 History of Firewall
 Purposes of Firewall
 Types of Firewall
A logical barrier designed to prevent
unauthorized or unwanted
communications between sections of
a computer network
•Firewalls are frequently used to prevent
unauthorized Internet users from
accessing private networks connected to
the Internet, especially intranets.
•All messages entering or leaving the
intranet pass through the firewall, which
examines each message and blocks those
that do not meet the specified security
History of Firewall
•Firewall technology first began to
emerge in the late 1980s when the
Internet was still a fairly new technology
in terms of its global usage and
•The original idea was formed in response
to a number of major internet security
breaches, which occurred in late 1980’s.
•In 1988, The Morris Worm was the first
large scale attack on Internet security,
which the online community neither
expected, nor were prepared for.
•Firewalls can be implemented in both
hardware and software, or a
combination of both.
 The first firewall was developed by
Bill Cheswick called “Evening with
Berferd" [1992] in which he set up a
simple electronic “jail" for an
attacker. In this jail, the attacker was
unable to affect the real system but
was left with the impression that he
or she had successfully broken it.

 Cheswick was able to observe

everything the attacker did, learning
from these actions, and alerting
system administrators of the
networks from where the attacks
 Marcus Ranum's work on the
technology spearheaded the creation
of the first commercial product. The
product was released by Digital
Equipment Corporation's (DEC) who
named it the SEAL product, in 1991.

 Cisco, one of the largest internet

security companies in the world
released the product to the public in
Purposes of Firewalls
 Blocking Certain Traffic.
 Proxies.
 Inter Connection Sharing.
 Virtual Private Networks (VPN).
Blocking Certain
Firewalls can block certain
network traffic coming in or going
out of the local network. Traffic
can be filtered through many
different rules, including its
source and/or destination, and
the type of traffic.
 Blocking Incoming Traffic.
 Blocking Outgoing Traffic.
 Blocking Based on source and
 Blocking Based on Type of Traffic.

Proxy server is a computer that offers a

computer network service to allow
clients to make indirect network
connections to other network services.
This is One type of firewall mechanism
that provides some useful features.

They can do two types of work:

•Content Filtering
•Data Caching
Internet Connection
 With Network Address Translation (NAT) enabled
Firewalls, a single Internet connection can be
shared by multiple users.
 NAT works by taking network requests from
computer s on the local network and sending them
out as if they came directly from the firewall itself.
 When the responses come back to firewall, it
remembers who made request for that data, and
gives response back to that computer.
 This may seem similar to how proxies work, but
NAT works at a much more general level, which
enables any type of network traffic to be sent and
received using this method, not just specific
protocols such as HTTP and FTP.
Virtual Private
•Firewalls with virtual private
networking (VPN) features can increase
security between trusted computers by
encrypting the data sent through
untrusted network paths (such as the
Internet ).
•Virtual Private Networking works by
VPN- aware firewalls at the entry points
of all
sub - networks that are to be connected
together to create the one large
•When requests are sent from a local
computer to connect to another
computer, the firewall recognizes the
Types of Firewall
There are two types of firewalls
•Standalone Hardware Firewalls.
•Software-Based Firewalls.
Hardware Firewalls
 Standalone hardware firewalls are
computer network devices built
specifically for firewall purposes.
 They are typically designed to be used in
large computer networks, such as those
found at universities or businesses.
 Standalone Hardware Firewalls are
typically administered by a direct serial
connection between the firewall and a
simple text - based terminal computer.
 Hardware firewalls can be great for large
networks, they may not be practical
when only a few computers need to be
Software Based
 Software - based firewalls perform the
same functions as hardware – based
firewalls, but instead of working as
standalone devices on the network,
they run on computers connected to
the network.
 Norton Personal Firewall, BlackIce,
Zonealarm are the few examples of
Software Firewall. There are open
source firewalls available such as
ipchanes and iptables for unix based