0% found this document useful (0 votes)
32 views6 pages

Firewalls: By-Saurabh Khan

Firewall technology emerged in the late 1980s to build a barrier between secure internal networks and less secure external networks like the Internet. There are two main types of firewalls - software-based firewalls that run on operating systems and hardware-based firewalls like Cisco and Juniper devices. Firewalls work by analyzing data packets and determining whether to allow or block them based on preset rules. They use different techniques depending on where communication takes place and its state, including network layer techniques like stateful and stateless packet filtering and application layer inspection that can understand application protocols. Proxy servers can also act as firewalls by responding like applications while blocking other packets.

Uploaded by

SAIMAN OP
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views6 pages

Firewalls: By-Saurabh Khan

Firewall technology emerged in the late 1980s to build a barrier between secure internal networks and less secure external networks like the Internet. There are two main types of firewalls - software-based firewalls that run on operating systems and hardware-based firewalls like Cisco and Juniper devices. Firewalls work by analyzing data packets and determining whether to allow or block them based on preset rules. They use different techniques depending on where communication takes place and its state, including network layer techniques like stateful and stateless packet filtering and application layer inspection that can understand application protocols. Proxy servers can also act as firewalls by responding like applications while blocking other packets.

Uploaded by

SAIMAN OP
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 6

FIREWALLS

By-Saurabh khan
1- Introduction-
Basically, a firewall is a barrier to keep
destructive forces away from your
property. In fact, that's why its called a
firewall. Its job is similar to a physical
firewall that keeps a fire from spreading
from one area to the next. In this report,
we will cover the main points about :
What are firewalls and its types? How do
firewalls work? What techniques do
firewalls use? What is a proxy?
2- History –
Firewall technology emerged in the late 1980s when the
Internet was a fairly new technology in terms of its global
use and connectivity. A network's firewall builds a bridge
between an internal network that is assumed to be secure
and trusted, and another network, usually an external
network, such as the Internet, that is not assumed to be
secure and trusted.
3- Types of firewall
A firewall can either be
software-based (ex: AVG-Zone Alert- ISA –TMG) or
hardware-based (ex: Cisco-JUNIPER) and is used to help
keep a network secure. Its primary objective is to control
the incoming and outgoing network traffic by analyzing
the data packets and determining whether it should
be allowed through or not, based on a predetermined
rule set. Many personal computer operating systems
include software-based firewalls to protect against
threats from the public Internet.
4- Techniques of firewall There are different
Techniques of firewalls depending on where the
communication is taking place, where the
communication is intercepted and the state that is
being traced.

4. A- Network layer: Network layer firewalls


generally fall into two sub-categories, stateful and
stateless.

First generation packet filters "stateless".

Second generation: filters circuit level "stateful".


4. B- Application layer firewall (Third generation) The key benefit
of application layer filtering is that it can "understand" certain
applications and protocols (such as File Transfer Protocol (FTP),
Domain Name System (DNS), or Hypertext Transfer Protocol
(HTTP)). This is useful as it is able to detect if an unwanted protocol
is attempting to bypass the firewall on an allowed port, or detect if a
protocol is being abused in any harmful way. (Usually dropping
them without acknowledgment to the sender).

5- Proxies as a firewall A proxy server (running either on dedicated


hardware or as software ex: ISA or TMG) may act as a firewall by
responding to input packets in the manner of an application, while
blocking other packets. A proxy server is a gateway from one
network to another for a specific network application.

You might also like