You are on page 1of 12

SEMINAR REPORT ON FIREWALL

Submitted To: Ms. Gagandeep (Lect. In CSE Dept.) 7357(cse7thsem.) Submitted By: Sunita Sihag

A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer A firewall can greately improve network security and reduces risks to hosts on the subnet by filtering insecure services A security system that acts as a protective boundary between a network and the outside world

Rules Determine WHO ? WHEN ? WHAT ? HOW ?

INTERNET INTERNET

My PC

Firewall

Protected Network

1.packet filtering firewalls 2.circuitlevel gateways 3.application gateways 4.stateful multilayer inspection firewall

These firewalls work at the network layer of OSI model or IP layer of TCP/IP. In a packet filtering firewall, each packet is compared to a set of criteria before it is forwarded. Pass the packet through a set of rules, based on the contents of IP and transport header fields of packet

They can filter packets at the Application layer of OSI or TCP/IP model. It is also called a proxy server because it acts like a proxy and decides about the flow of application level traffic.

These firewalls work at the Session layer of OSI model or TCP/IP layer of the TCP/IP. Circuit level gateways are relatively inexpensive and have advantage of hiding information about the private network they protect. They do not filter individual packets.

It combine the aspects of other three types of firewalls. It provides a greater level of security control by enforcing security policies at the application socket. A typical communication session between two computers will consists a several thousand packets, each of which is identified by a unique source and destination address and sequence number.

Firewalls protect private local area network from hostile intrusion from the internet. The greatest advantage is that no direct connections are allowed through the firewall under any circumstances. Provide a controlled access to sensitive systems. Relatively inexpensive or free for personal use

Firewalls cannot protect you from internal destructions within a network. The configuration can be too complex to implement correctely. Firewalls offer weak defence from viruses. The most obvious being that certain types of network access may be hampered or even blocked for some hosts, including telnet, ftp etc.

Firewalls will continue to advance as the attacks on IT infrastructure become more and more sophisticated More and more client and server applications are coming with native support for proxied environments Firewalls that scan for viruses as they enter the network and several firms are currently exploring this idea, but it is not yet in wide use.

You might also like