All You need to know About Firewall - PowerPoint PPT Presentation

About This Presentation
Title:

All You need to know About Firewall

Description:

Cyberoam offers next-generation firewall and UTM firewall that provide stateful and deep packet inspection for network, application and user identity-based security. Cyberoam firewall appliances provide ease of management and high security with flexibility. – PowerPoint PPT presentation

Number of Views:118
Slides: 15
Provided by: Username withheld or not provided
Category: Other
Tags: firewall

less

Transcript and Presenter's Notes

Title: All You need to know About Firewall


1
All You Need to Know About Firewall
2
Firewall N/W Security
  • A firewall can be described as a network security
    system whose function is to control and monitor
    incoming and outgoing networks. A firewall is
    based on predetermined security rules. It acts as
    a barrier securing an inner network from an outer
    network, for instance, internet. Network firewall
    is a software appliance running on hardware based
    firewall used to filter traffic on more than two
    networks.
  • A layer of software protection is provided by a
    host based firewall on one of the hosts that is
    responsible for network traffic. Routers are
    used to separate different broadcast domains and
    pass data between networks, these networks
    contain firewall components and also performs
    basic routing functions.

3
How do Firewalls Work
  • Firewalls are set up at every Internet connection
    point. This helps the system in evaluating even
    the minutest of data which flows into it. These
    firewalls can be tuned to follow a specific set
    of rules, either specified by you or by the
    administrator, to allow traffic to their servers.

4
Characteristic of Firewall
  • Direction control Helps  determine direction for
    the initiation of requests allowed to flow from
    Firewalls.
  • Service control To determine types of services
    that are accessible, such as outbound and
    inbound. Traffic can be filtered on the basis of
    protocol, port number, proxy servers and IP
    addresses.
  • Behavior control It controls some particular
    services. A portion of the information provided
    on a local web server may be externally
    accessible.
  • User Control It can be applied for incoming
    traffic from external users and requires some
    form of authentication such as provided by IPsec.

5
OSI Vs TCP/IP Networks Model
  • To understand the working of a firewall, we must
    know how different networking layers interact in
    the flow. Each layer has a set of
    responsibilities and is handled in a well-defined
    manner. The OSI model is a newer version that has
    become a standard as TCP/IP does not meet several
    requirements and industry standards.
  • The lowest level at which a Firewall works is
    layer three and it is defined as the network
    layer in OSI model whereas in TCP/IP it works as
    an Internet protocol layer. This layer is
    concerned with the destination of routing
    packets. At this level, it can be determined
    whether the source is trusted or not.

6
Need of Firewall Protection
  • There is no doubt that internet has transformed
    the way the companies transacted their business
    years ago. Although enterprises are leveraging
    its use for day-to-day business transactions, but
    internet has some setback.
  • Internet has made confidential data available to
    unscrupulous computer geeks who look out for such
    sensitive data either to trade or fulfil their
    other vested interests. Firewall works as a
    protective sheet between private enterprise
    networks and hackers, to prevent the theft of
    such confidential enterprise data.

7
Use of Next-generation firewalls (NGFW)
  • Next Generation Firewalls came into the picture
    due to some limitations in Stateful Packet
    Inspection as it does not inspect network packets
    containing data payload and also due to high
    network traffic, it uses web protocols, including
    business and non-business applications. New
    approaches have been added by security vendors,
    including deep packet and inspection intrusion
    prevention, for the detection of malware in
    network traffic.
  • This can be a drawback too as these approaches
    add more and more devices that add latency, as
    these packets are passed from one appliance to
    the other. These devices should be configured in
    some unified threat management systems so that
    multiple functions can be handled in a single
    platform. NGFW helps address application
    awareness drawbacks and traffic inspection,
    without hampering performance.

8
The Development of Firewall Types in Network
Security System
  • Network security has been through a lot of
    changes and iterations in order to have evolved
    and provide better protection to users. . In this
    brief blog post, we provide you information about
    the different types of network firewall.
  • Access Control Lists (ACLs) This type of
    firewall was used earlier and used for routers.
    It was fairly used for performance and
    scalability however a drawback of this firewall
    is it is unable to read anything more than packet
    headers. This provides only the undeveloped and
    fundamental information about the traffic.
  • Proxy firewalls The firewall works on incoming
    network traffic by copying the anticipated
    recipient. Proxy firewalls inspect the network
    traffic and send details to the destination
    computers that is possible only when the access
    is permitted. The response of the computer
    response is then transferred to the proxy that
    sends the data across with the origin address of
    the proxy server. Through this process the proxy
    firewalls build a gap between two computers which
    implies that it is the only machine connected to
    the outside world.

9
The Development of Firewall Types in Network
Security System (Cont.)
  • Stateful inspection firewalls An evolutionary
    step in the world of network firewall, it is
    effective in sorting and tracking the actual
    state of traffic. It tracks the state of traffic
    by examining all the connection interactions till
    the time a connection is suspended.
  • Unified Threat Management (UTM) solutions These
    are the solutions that combine stateful
    examination firewalls, IPS and antivirus into a
    single machine by taking into account other
    network security capabilities.
  • Next-generation firewalls (NGFWs) These
    firewalls were created to counteract the growing
    capability of appliances and malware. The NGFW
    brings together the major network protection
    functions, comprising of unconventional firewall,
    URL filtering, IPS/IDS and threat security. The
    NGFW solutions ensure improved security as
    compared to the legacy firewalls, point threat
    finding products, or UTMs. These functions are
    designed into the product from the beginning and
    share important information across various
    disciplines.

10
Benefits of Firewall
  • Prevent attacks on your private network by the
    other networks outside the world.
  • It allows you to define a funnel, keeping aside
    the non-authorized users.
  • Allow monitoring the security of your network and
    computer when suspicious activity occurs, it will
    generate an alarm.
  • Monitor and record services using WWW (World
    Wide Web), FTP (File Transfer Protocol) and other
    protocols.
  • Control the use of Internet. It helps to block
    or un-block inappropriate or appropriate
    material.

11
Disadvantages of Firewall
  • Legitimate User Restriction
  • Diminished Performance
  • Vulnerabilities
  • Internal Attack
  • Cost

12
Our Social Reach
13
Cyberoam Technologies
USA Central 1-732-412-4896Delhi NCR
91-9899150300 Ahmedabad 91-9925011328 Bangalo
re 91-9880345671 Dubai
971-4-214 9860
Cyberoam House, Saigulshan Complex, Opp.
Sanskruti, Beside White House, Panchwati Cross
Road, Ahmedabad - 380006, GUJARAT, INDIA.
North America 505 Thornall Street, Suite
304 Edison, NJ -08837 USA
sales_at_cyberoam.com http//www.cyberoam.com/
14
Thank You
Write a Comment
User Comments (0)
About PowerShow.com