Transcript Firewall
Firewall
Ercan Sancar
&
Caner Sahin
Index
•
•
•
•
•
•
•
History of Firewall
Why Do You Need A Firewall
Working Principle Of Firewalls
Can a Firewall Really Protect Me?
Multiple Firewalls
Firewall Functions in Windows
Choosing a Firewall that Meets
History Of Firewall
Firewall technology emerged in the late
1980s...
Why Do you Need a Firewall?
What is Firewall???
• A firewall is a piece of software or
hardware...
What Firewall Do???
•
•
•
•
•
•
Block incoming network traffic based on source or destination.
Block outgoing network traffic based on source or destination.
Block incoming network traffic based on content.
Make internal resources available.
Allow connections to internal network.
Report on network traffic and firewall activities.
What Firewall Can’t Do???
•
•
•
•
Inside attack!
Social engineering.
Viruses and Trojan horse programs.
Poorly trained firewall administrators.
A Firewall That Fits
• Personal Firewall
• Departmental or small organiztion Firewall
• Enterprise Firewall
Some Firewall Rules
• Allow everyone to access all Web Sites
• Allow outgoing e-mail from the internal mail server
• Drop all outgoing network traffic unless it mathces the first
two rules
• Allow incoming Web request to the public Web server
• Drop all incoming network traffic expect for connections
to the public Web server
• Log all connection attempts that were rejected by the
firewall
• Log all access to external Web sites
Basic Function of Firewall
• Packet filtering
• Network Address Translation(NAT)
• Application Proxy
Working Principle of Firewalls
• General Strategy: Allow-All or Deny-All
• Filtering Properties
General Strategy of Firewall
•
•
Allow-all Strategy:Allow all network packets except those
that are explicitly denied.
Deny-all Strategy:Denies all network packets except those
that are explicity allowed.
Example Firewall Rules
Filetering Properties
• Packet Filtering
• Network Address Translation(NAT)
• Application Proxy
Packet Filtering
• What is Packet Filtering?
• Filtering IP data.
Example of Fragment
Network Address
Translation(NAT)
• What is NAT?
• Security Aspects of NAT.
• Consequences of NAT.
Application Proxy
• What is Application Proxy
• Differnce between Application Proxy and
Packet Filtering
• Advantages of Application Proxy
• Drawbacks of Application Proxy
Comparison of NAT & Proxy
NAT
• Network and
Transport layer
• Not concerns with
contents
• Users don’t need any
settings
• Every program uses
the same
Proxy
• Application Layer
• Interface with the
content
• Users need to setup
the settings
• Differnt programs can
use differnt proxies
Can a Firewall Really Protect
Me?
A firewall is indeed a very effective
method of protection against many of these
threats, but...
Multiple Firewall
• When Two Firewall Are Better Than One
• Designing Demilitarized Zones(DMZ)
Designing Demilitarized Zones
Advantages of DMZ with Two
Firewall
• Clear Definition of The DMZ
• Increased Security
• Reduce Network Loads on the Two Firewalls
Disadvantages of DMZ with Two
Firewall
•
•
•
•
Increased Cost
Extra Training Required
Multiple Firewall Rule Listing Must be Maintained
Configuration Complexity When more Than Two
Firewall are Deployed
Firewall Functions in Windows
• Packet Filtering
• Network Address Translation(NAT/ICS)
• Encrypted Tunnel
Firewall Functions Which is not
provide in Windows
• No application Proxies
• No (or less-than-ideal)monitoring and logging
• No data caching
Choosing a Firewall That Meets
• How do you decided?
• What compare?
Thank you For Listening