2. Firewall is a network security device, either hardware or software
based, which monitors all incoming and outgoing traffic and based on
defined set of security rules it accept, reject or drop that specific traffic.
• Accept : allow the traffic.
• Reject : block the traffic but reply with an “unreachable error”.
• Drop : block the traffic with no reply.
Firewall establishes a barrier between secured internal networks
and outside untrusted network, such as Internet.
Connectivity to the Internet is no longer optional for
organizations. However, accessing Internet provides benefits to the
organization; it also enables the outside world to interact with internal
network of the organization.
3. Firewall match the network traffic against the rule set
defined in its table. Once the rule is matched, associate
action is applied to the network traffic.
Code server and at the same time other rule is defined like
system administrator can access the data from both HR and
technical department. Rules can be defined on firewall
based on the necessity and security policies of organization.
From the perspective of a server, network traffic can be
either outgoing or incoming. Firewall maintains distinct set
of rules for both the cases.
4. Mostly the outgoing traffic, originated from the server itself,
allowed to pass. Still, setting rule on outgoing traffic is always
better in order to achieve more security and prevent unwanted
communication.
Default policy: -
It is very difficult to explicitly cover every possible rule on
firewall. For this reason, firewall must always have a default policy.
Default policy only consist action (accept, reject or drop). Suppose
no rule is defined about SSH connection to the server on firewall. So,
it will follow default policy.
5. • First generation: packet filter:-
The first reported type of network firewall is called a packet filter.
Packet filters look at network addresses and ports of packets to determine if
they must be allowed, dropped, or rejected.
The first paper published on firewall technology was in 1988, when
engineers from Digital Equipment Corporation (DEC) developed filter
systems known as packet filter firewalls.
At AT&T Bell Labs, Bill Cheswick and Steve Bellovin continued their research
in packet filtering and developed a working model for their own company
based on their original first generation architecture.
6. • Second generation: Stateful filters:-
From 1989–1990 three colleagues from AT&T Bell Laboratories, Dave
Presotto, Janardan Sharma, and Kshitij Nigam, developed the second
generation of firewalls, calling them circuit-level gateways.
Second-generation firewalls perform the work of their first-generation
predecessors but operate up to layer 4 (transport layer) of the OSI model.
• Third generation: application layer :-
Marcus Ranum, Wei Xu, and Peter Churchyard developed an application
firewall known as Firewall Toolkit (FWTK).
In June 1994, Wei Xu extended the FWTK with the kernel enhancement of IP
filter and socket transparent.
Gauntlet firewall was rated one of the top firewalls during 1995–1998.
As of 2012, the so-called next-generation firewall (NGFW) is nothing more
than the "wider" or "deeper" inspection at the application layer.
7. 1. Packet Filtering Firewall :-
A packet filtering firewall applies a set of rules to each incoming and
outgoing IP packet and then forwards or discards the packet.
The firewall is typically configured to filter packets going in both directions.
Filtering rules are based on information contained in a network packet:
• Source IP address
• Destination IP address
• Source and destination transport-level address
• IP protocol field
attacks that can be made on packet filtering firewalls and the appropriate
countermeasures are the following:
IP address spoofing
Source routing attacks
Tiny fragment attacks
8. 2. Stateful Inspection Firewalls :-
Stateful inspection, also known as dynamic packet filtering, is a
firewall technology that monitors the state of active connections and
uses this information to determine which network packets to allow
through the firewall.
Stateful inspection has largely replaced an older technology, static
packet filtering.
They examine each IP packet in context
Keep track of client-server sessions
Check each packet validly belongs to one
Hence are better able to detect bogus packets out of context
3. Application-Level Gateway :-
An application-level gateway, also called an application proxy, acts
as a relay of application-level traffic.
9. Has full access to protocol
User requests service from proxy
Proxy validates request as legal
Then actions request and returns result to user
It scan HTTP,FTP ,TELNET and SMTP.
4 .Circuit-Level Gateway :-
Relays two TCP connections are established.
Imposes security by limiting which such connections are allowed.
Once created usually relays traffic without examining contents.
Typically used when trust internal users by allowing general
outbound connections.
SOCKS commonly used for this firewall.
10. Advantages of firewall :-
Reliability:-
Firewall is more reliable.
Physical appliances are vulnerable to a life cycle, and will grow to become obsolete
eventually.
Firewall allows for constant provision, with no need for a physical applies.
Simplicity :-
Firewall makes things much simpler to understand and implement; you subscribe to a
firewall service the same way you might subscribe to a CRM or cloud storage provider.
External Authority :-
Enlisting the help of Firewall is also a way to delegate the authority of firewall
maintenance to an external expert.
Remote Coverage:-
It can be deployed to remote locations without any interruptions from your desired
protocols, and you can rest assured you’ll get the same protection at each area.
11. Cost-Effectiveness:-
Firewall is often more cost-effective than a traditional firewall.
Providers usually offer different levels of protection and coverage, based on
your needs, but almost any package is going to be cheaper than trying to
manage everything yourself.
Dis-Advantages of firewall :-
Diminished Performance:-
Software-based firewalls have the added inconvenience of inhibiting your computer's
overall performance.
Software firewalls are constantly running and use processor power and RAM memory to
perform their function.
Vulnerabilities:-
firewalls only serve as a perimeter to block unauthorized data transmissions.
they don't provide anti-virus, anti-malware or anti-spyware capabilities.
need additional protection if this harmful software is accidentally introduced into the
system through trusted channels like email.
12. Internal Attack:-
Firewalls can be useful in repelling intrusions, but they offer no protection
against sabotage.
Most firewalls have been somewhat hand-built by site
administrators, however the time and effort that could go into
constructing a firewall may outweigh the cost of a vendor solution.
13. William Cheswick:-
o Cheswick joined Systems and Computer Technology Corporation,he served
as a Systems Programmer and Consultant between 1978 and 1987.
o Cheswick joined Bell Labs in 1987.
o he and Steven M. Bellovin created one of the world's first network firewalls.
o Publication of the seminal book Firewalls and Internet Security .
o Cheswick and Bellovin also created one of the world's first honeypots in the
course of detecting and trapping .
Aviel David Rubin:-
o Rubin is a professor of computer science at Hopkins and technical director of
the JHU Information Security Institute.
o He also founded Harbor Labs-provides technical expertise and testimony in
high tech litigation.
14. o at & T Labs- Research in the area of cryptography, network security Web
security and secure Internet services
David Pensak claims to have built the first commercially successful firewall.
William Cheswick and Steven Bellovin, who literally wrote the book on
firewalls in 1994 while at AT&T Bell Labs.
Jeff Mogul, Paul Vixie, Brian Reid, Fred Avolio, and Brent Chapman, and others
were associated in some way with the roots of firewall technology(Several of
them have been called the father of the firewall).
Marcus Ranum was the father of the first firewall 'product' DEC SEAL, the open
source [firewall], and the TIS Gauntlet.
David Presotto and his colleagues added the stateful inspection concept.
Nir Zuk was the father of the stateful firewall product .
DEC SEAL, which was shipped in 1992, was the first commercial firewall and
included proxies developed by Ranum.
15. Firewall Protects Computer From Unauthorized Remote Access:-
One of the worst things that could happen to your computer is if someone
attempts to take control remotely.
Thus preventing hackers from taking over your computer.
This does not block the remote control apps used by the Windows tech
support scammers.
Windows found on the Bit torrent networks often come with malware
preinstalled in the disk image.
firewalls block access by apps perhaps software that you trust from
unauthorized Internet access.
Firewalls Can Block Messages Linking to Unwanted Content
Firewalls Make Online Gaming Safer :-
16. Firewalls Make Online Gaming Safer :-
Online gaming is one of the most significant developments in the history of video
games, but it is also a potential security risk.
Any attempts by hackers to use their malware to get into your system will be
blocked, leaving your system secure.
Console gamers can take advantage of hardware firewalls or routers if there is a
requirement to edit settings.
You Can Block Unsuitable or Immoral Content With a Firewall :-
protecting personal directories from ransomware, firewall applications might also
feature the option to block particular online locations.
find that content filtering comes with some domestic security suites , usually in
close proximity to the firewall.
Firewalls Can Be Hardware or Software :-
firewalls don’t necessarily have to be software.
Determines the types of Internet services that can be accessed, inbound or
outbound.
The firewall may filter traffic on the basis of IP address, protocol, or port number
17. Direction control: Determines the direction in which particular service
requests may be initiated and allowed to flow through the firewall.
User control: Controls access to a service according to which user is
attempting to access it. This feature is typically applied to users inside the
firewall perimeter (local users).
The following capabilities are within the scope of a firewall:-
A firewall defines a single choke point that keeps unauthorized users out of
the protected network.
Prohibits potentially vulnerable services from entering.
Provides a location for monitoring security-related events.
Convenient platform for several Internet functions that are not security
related.
The firewall can be used to implement virtual private networks.
Audits and alarms can be implemented on the firewall system.
A firewall can serve as the platform for Ipsec.
18. Data Collection:- For this study we have collected both primary data as
well as secondary data.
Primary Data :-As it is important for any research related field work
that the literature review of the same topic is essential and has to be
done carefully as it fills the voids and answers the researcher’s common
questions.
we did the literature review of Firewall Security topic that is
discussed specifically in the separate section .
We also referred to the published books which are related to the “Firewall
Security”.
The main data is collected through the questionnaires as it can be carried
out by the researcher or by any number of people with limited affect to its
validity and reliability. We asked total 14 Questions to the students and
people of society which led us to some findings and the conclusions.
19. Secondary Data :-Secondary Data for the research topic is mainly
collected from internet.
We also referred to some research journals which are already
published specifically which are open source for the other researchers
for the on-going research.
Objectives:- The major objectives of this are to Study of Computers
Security Today’s Need:-
To introduce and awareness of Firewall and why it’s necessary in
today’s life.
To find out Advantages &Disadvantages of Firewall And Security
Device.
Methods:-
Sample Procedure:-The survey was conducted by individually Person
meet .Sample size of persons is 25. The survey response rate was
Normal , with 60-70 % of student and people are participating.
20. • Knowing about firewall
• Better security Option
How many people know Firewall ?
Know Don’t Know
30%
70
98%
2%
Opinion of the Peoples
Yes No
21. • Budget spent on security Items
• Rate to firewall
7%
37%
30%
26%
A huge amount Quite a lot Not much I don’t know
2%
22%
75%
1%
Rate
Good very Good Excellent Not good at all
22.
23.
24. Awareness about firewall security
I observe in this survey most of the peoples(nearly 60% to
70% people) not aware about security of firewall and also be the
working of firewall and How to apply Firewall protection .
It is observed from the analysis of awareness about Firewall
security that software firewall are more popular which is provided by
Some antiviruses . Can Hardware Firewall is found to be less popular
among the sampled respondents. Regarding the source of
information about Firewall we oberve hardware based firewall mostly
used in only organizations to protect our LAN Network,connected
computers blocking somesites which is access from in network
computers. Organizations and people used firewall for creat Virtual
Private Network(VPN) .
25. In conclusion, the Internet has become a dangerous place.
Thirteen-year-old kids on dial-up accounts can crash a site supported
by two T-1 connections by using hundreds of zombies (PCs
hacked and uploaded with a Trojan) to flood with UDP and ICMP
traffic. This is simply a malicious attack meant to consume all of
the bandwidth of a connection to the Internet.
The resulting storm of packets consumes all bandwidth and
disconnects or makes the site unusable for normal traffic. Hackers
attack networks to destroy and/or steal information.
No one should be on the Internet without a firewall. All
networks are protected by firewalls. However, it is always a trade-off.
The whole point of the Internet is communication and exchange of
information.
26. It is clear that more needs to be done in terms of education
and understanding of the advantages that firewall security
automation brings to the business efficiency table and how it allows
the right set of organizational processes between the relevant
stakeholders to be defined and implemented.
27. • William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin (2003).
"Google Books Link". Firewalls and Internet Security: repelling the
wily hacker.
• "VPNs and Firewalls". technet.microsoft.com.
• "What is a VPN Firewall? – Definition from
Techopedia". Techopedia.com.
• Ingham, Kenneth; Forrest, Stephanie (2002). "A History and Survey
of Network Firewalls" (PDF).
Websites
https://en.wikipedia.org/wiki/Firewall_(computing)