FIREWALLS
Firewalls
Routers, Switches, Hubs
VPNs
Firewalls
Implemented
• Hardware
• Software
• Combination of (Hardware and Software)
Types
• Host-based (Personal)
• Network
Things we can do with firewalls
• All data traffic from outside is separated from inside the
firewall
• We could allow only traffic coming to port 80 to be
allowed.
• We could allow all traffic except traffic to port 80 to be
allowed.
• No ftp traffic allowed (unencrypted passwords)
Network firewall
• Use a firewall device (usually a computer running firewall
software)
• Install 2 interfaces.
• 1) connected to our internal network interface
• 2) connected to the external network or internet
• All data going to and from the internet travels though the
firewall following rules that decide if traffic can or can not
go though
• Places at the boundary of the trusted network
Host based (Personal) Firewall
Software installed on one host (computer) that checks all traffic to-
and-from that system.
Layers of firewalls
• Several firewalls can be used that prohibit traffic from
passing though. This makes it more difficult for hackers to
get though.
• Most operating systems come with host based firewalls and right there if you
have a network based fire wall and use an OS with firewalls, you have 2
layers of firewalls.
Firewalls read IP packets
• Network layer data such as IP address and Port Numbers
of the source and destination are read and checked
against internal tables.
• Host based firewalls are usually application firewalls.
• Network based firewalls are usually Packet Filters.
Policies for traffic going through
• Allow Policy – all packets that do not meet the “allow
criteria” are blocked.
block everything and open holes
• Deny Policy - all packets that meet the “deny criteria” are
blocked.
block nothing and close holes
Detections of a possible intrusion
DNS (Domain Name System)
• A system that maps IP addresses to URL names
• www.facebook.com = 31.13.80.36
• www.amazon.com = 13.33.60.247
If you firewall blocks www.facebook.com and you can get to a
different ip address to a different facebook server, you can get in
directly using the unblocked IP address.
Hubs, Switches, and Routers
• Hubs – connect a few computers together. All messages
sent out of one computer is broadcasted (spamed) to all
computer connected to the hub.
• Switch – can be used to join switched LANs
• Router – connects at least 2 networks
• Bridge – connects two networks
(LANs) to create 1 network.
Routers, Switched, Hubs and OSI
VPN (Virtual Private Network)
VPN (Virtual Private Network)
• A virtual private network (VPN) extends a private
network across a public network, and enables users to
send and receive data across shared or public networks
as if their computing devices were directly connected to
the private network.
• VPNs may allow employees to securely access a
corporate intranet while located outside the office
• A VPN is created by establishing a virtual point-to-point
connection through the use of dedicated connections,
virtual tunneling protocols, or traffic encryption
VPN pros and cons
Pros:
• VPNs can bypass some firewall content restrictions and
censorship.
Cons:
• Speed is slowed down:
• New link to communication path. You  VPN  Destination
• Encryption / decryption algorithms
• You compete with other users of the VPN server.
• VPN cost about $60/year (Free ones are very slow)

More Related Content

PPTX
Cyber Security - Firewall and Packet Filters
PPT
Network security chapter 6 and 7 internet architecture
PPTX
Section c group2_firewall_ final
PPTX
Demilitarized Zone (DMZ) in computer networking
PPTX
Lecture-13-Firewall_information_Security.pptx
PPT
CS10NETWOKSecurityhdhgsfdhsdheahgqergd.ppt
PDF
CNIT 123: Ch 13: Network Protection Systems
PPTX
Improvement in Rogue Access Points - SensePost Defcon 22
Cyber Security - Firewall and Packet Filters
Network security chapter 6 and 7 internet architecture
Section c group2_firewall_ final
Demilitarized Zone (DMZ) in computer networking
Lecture-13-Firewall_information_Security.pptx
CS10NETWOKSecurityhdhgsfdhsdheahgqergd.ppt
CNIT 123: Ch 13: Network Protection Systems
Improvement in Rogue Access Points - SensePost Defcon 22

Similar to firewalls.pdf (20)

PPTX
VPN & FIREWALL
PPTX
IPS NAT and VPN.pptx
PPT
Network security and protocols
PPTX
DDOS ATTACKS
PPSX
9th Computer Network for the students to help them
PPTX
Computer networks
PPT
Network sec 1
PPTX
fire walls
PPTX
Ip tables
PPTX
U-2.pptx............................................
PPTX
Firewall
PPT
Introduction to firewalls
PPT
04 introduction to computer networking
PDF
Intro to firewalls
PPTX
Firewall ( Cyber Security)
PPTX
Introduction to router
PPTX
firewall firewall firewall firewall firewall firewall firewall firewall
PPTX
Network defenses
PPTX
Securing E-commerce networks in MIS and E-Commerce
PPTX
Assignment on windows firewall
VPN & FIREWALL
IPS NAT and VPN.pptx
Network security and protocols
DDOS ATTACKS
9th Computer Network for the students to help them
Computer networks
Network sec 1
fire walls
Ip tables
U-2.pptx............................................
Firewall
Introduction to firewalls
04 introduction to computer networking
Intro to firewalls
Firewall ( Cyber Security)
Introduction to router
firewall firewall firewall firewall firewall firewall firewall firewall
Network defenses
Securing E-commerce networks in MIS and E-Commerce
Assignment on windows firewall
Ad

More from MattMarino13 (20)

PPTX
INFO 2106 2-17-25.pptx Course Slide Deck
PPTX
INFO 2105 PPTs Fall 2024 ---------------
PPTX
1-22-24 INFO 2106.pptx
PPTX
1-24-24 INFO 3205.pptx
PPTX
BITM3730 11-14.pptx
PPTX
01_Felke-Morris_Lecture_ppt_ch01.pptx
PPTX
02slide_accessible.pptx
PPTX
Hoisington_Android_4e_PPT_CH01.pptx
PPTX
AndroidHTP3_AppA.pptx
PPTX
9780357132302_Langley11e_ch1_LEAP.pptx
PPTX
krajewski_om12 _01.pptx
PPTX
CapsimOpsIntroPPT.Marino.pptx
PPTX
Project Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptx
PPTX
Project Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptx
PPTX
Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...
PPTX
Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...
PPTX
Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...
PPTX
1-23-19 Agenda.pptx
PPTX
EDF 8289 Marino PPT.pptx
PPTX
Agenda January 20th 2016.pptx
INFO 2106 2-17-25.pptx Course Slide Deck
INFO 2105 PPTs Fall 2024 ---------------
1-22-24 INFO 2106.pptx
1-24-24 INFO 3205.pptx
BITM3730 11-14.pptx
01_Felke-Morris_Lecture_ppt_ch01.pptx
02slide_accessible.pptx
Hoisington_Android_4e_PPT_CH01.pptx
AndroidHTP3_AppA.pptx
9780357132302_Langley11e_ch1_LEAP.pptx
krajewski_om12 _01.pptx
CapsimOpsIntroPPT.Marino.pptx
Project Presentation_castroxa_attempt_2021-12-05-18-30-10_No Cap.pptx
Project Presentation_mirzamad_attempt_2021-12-05-23-35-25_HTML_presentation.pptx
Project Presentation_padillni_attempt_2021-12-05-18-52-37_Web Application Pre...
Project Presentation_thomasb1_attempt_2021-12-05-17-50-13_Developing Web Apps...
Project Presentation_hernana1_attempt_2021-12-05-22-06-56_Miyamoto BITM 3730 ...
1-23-19 Agenda.pptx
EDF 8289 Marino PPT.pptx
Agenda January 20th 2016.pptx
Ad

Recently uploaded (20)

PPTX
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2015).pdf
PDF
Diabetes Mellitus , types , clinical picture, investigation and managment
PDF
Compact First Student's Book Cambridge Official
PDF
Journal of Dental Science - UDMY (2022).pdf
PDF
Farming Based Livelihood Systems English Notes
PDF
The TKT Course. Modules 1, 2, 3.for self study
PPTX
Diploma pharmaceutics notes..helps diploma students
PDF
African Communication Research: A review
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PPTX
ACFE CERTIFICATION TRAINING ON LAW.pptx
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PDF
Health aspects of bilberry: A review on its general benefits
PPTX
PLASMA AND ITS CONSTITUENTS 123.pptx
PPTX
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
PPTX
Thinking Routines and Learning Engagements.pptx
PPTX
Macbeth play - analysis .pptx english lit
PPTX
Climate Change and Its Global Impact.pptx
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2015).pdf
Diabetes Mellitus , types , clinical picture, investigation and managment
Compact First Student's Book Cambridge Official
Journal of Dental Science - UDMY (2022).pdf
Farming Based Livelihood Systems English Notes
The TKT Course. Modules 1, 2, 3.for self study
Diploma pharmaceutics notes..helps diploma students
African Communication Research: A review
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
ACFE CERTIFICATION TRAINING ON LAW.pptx
UNIT_2-__LIPIDS[1].pptx.................
Health aspects of bilberry: A review on its general benefits
PLASMA AND ITS CONSTITUENTS 123.pptx
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
Thinking Routines and Learning Engagements.pptx
Macbeth play - analysis .pptx english lit
Climate Change and Its Global Impact.pptx

firewalls.pdf

  • 2. Firewalls Implemented • Hardware • Software • Combination of (Hardware and Software) Types • Host-based (Personal) • Network
  • 3. Things we can do with firewalls • All data traffic from outside is separated from inside the firewall • We could allow only traffic coming to port 80 to be allowed. • We could allow all traffic except traffic to port 80 to be allowed. • No ftp traffic allowed (unencrypted passwords)
  • 4. Network firewall • Use a firewall device (usually a computer running firewall software) • Install 2 interfaces. • 1) connected to our internal network interface • 2) connected to the external network or internet • All data going to and from the internet travels though the firewall following rules that decide if traffic can or can not go though • Places at the boundary of the trusted network
  • 5. Host based (Personal) Firewall Software installed on one host (computer) that checks all traffic to- and-from that system.
  • 6. Layers of firewalls • Several firewalls can be used that prohibit traffic from passing though. This makes it more difficult for hackers to get though. • Most operating systems come with host based firewalls and right there if you have a network based fire wall and use an OS with firewalls, you have 2 layers of firewalls.
  • 7. Firewalls read IP packets • Network layer data such as IP address and Port Numbers of the source and destination are read and checked against internal tables. • Host based firewalls are usually application firewalls. • Network based firewalls are usually Packet Filters.
  • 8. Policies for traffic going through • Allow Policy – all packets that do not meet the “allow criteria” are blocked. block everything and open holes • Deny Policy - all packets that meet the “deny criteria” are blocked. block nothing and close holes
  • 9. Detections of a possible intrusion
  • 10. DNS (Domain Name System) • A system that maps IP addresses to URL names • www.facebook.com = 31.13.80.36 • www.amazon.com = 13.33.60.247 If you firewall blocks www.facebook.com and you can get to a different ip address to a different facebook server, you can get in directly using the unblocked IP address.
  • 11. Hubs, Switches, and Routers • Hubs – connect a few computers together. All messages sent out of one computer is broadcasted (spamed) to all computer connected to the hub. • Switch – can be used to join switched LANs • Router – connects at least 2 networks • Bridge – connects two networks (LANs) to create 1 network.
  • 14. VPN (Virtual Private Network) • A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. • VPNs may allow employees to securely access a corporate intranet while located outside the office • A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption
  • 15. VPN pros and cons Pros: • VPNs can bypass some firewall content restrictions and censorship. Cons: • Speed is slowed down: • New link to communication path. You  VPN  Destination • Encryption / decryption algorithms • You compete with other users of the VPN server. • VPN cost about $60/year (Free ones are very slow)