0% found this document useful (0 votes)
32 views17 pages

Firewalls

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views17 pages

Firewalls

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

FIREWALLS AND

THEIR ROLE IN
NETWORK SECURITY
Submitted by:

1.Yousuf Hussien Mohamed


2.Abdirashid Suleiman
Mohamed
3.Guuled Muse Mohamed
4.Mohamed Younis Hussien
Outline;

 Introduction

History of firewalls
how fireworks works
types of firewalls
role OF firewalls in network security
limitations of firewalls
integration with other security technology
future of firewalls
Introduction;
 What is a Firewall?

 Definition: A firewall is a security system, either hardware or software,


that controls and monitors incoming and outgoing network traffic based
on predetermined security rules. Its primary function is to block
unauthorized access to or from a private network.

 Purpose: Protects networks from unauthorized access.Permits legitimate


traffic while blocking malicious or unauthorized communications.Acts as
a barrier between a trusted internal network and untrusted external
networks (like the internet).
HISTORY OF FIREWALLS
 Firewalls emerged in the late 1980s as a response to growing concerns about network
security. The earliest firewalls were packet-filtering systems, which inspected individual
packets of data based on simple rules like IP addresses and ports. These were developed by
pioneers such as Cisco and AT&T Bell Labs.In the 1990s, firewalls evolved to include stateful
inspection, which allowed them to track active network connections and offer more dynamic
security by understanding the context of traffic. Around the same time, proxy firewalls
became popular, acting as intermediaries between users and the internet, offering greater
control over traffic by filtering entire requests and responses.By the 2000s, firewalls advanced
further with the introduction of Next-Generation Firewalls (NGFWs), which incorporated
additional features like deep packet inspection, intrusion prevention systems (IPS), and
application-level controls. These technologies helped firewalls transition from basic packet
filters to comprehensive security solutions, capable of defending against more sophisticated
cyber threats.Today, firewalls continue to evolve, integrating AI and machine learning for more
advanced threat detection and adapting to new network architectures, such as cloud
environments.
Click icon to add picture

There is not one inventor of the firewall. The firewall is the result of network
security advancements many experts made over time, including Jeff Mogul,
Paul Vixie, Brian Reid, William Cheswick, Steven Bellovin, David Presotto,
Marcus Ranum, David Pensak, Nir Zuk, Fred Avolio, and Brent Chapman.
1. The beginning (late 1980s – early 1990s)

• Packet-Filtering Firewalls
• Pioneers: Cisco and AT&T Bell

2. Evolution of firewall technology (1990s)

• Stateful Inspection Firewalls


• Proxy Firewalls

3. Next generation firewalls (2000s - present)

Next-Generation Firewalls (NGFWs)


• Deep Packet Inspection (DPI)
• Intrusion Prevention Systems (IPS)
• Application-Level Control
HOW FIREWALLS WORKS
 Packet-Filtering Firewalls: The first firewalls were simple systems designed to filter data
packets passing through a network based on predefined rules like IP addresses, ports, and
protocols. This method, known as packet filtering, allowed only authorized traffic to pass and
blocked unauthorized traffic.
 Pioneers: Cisco and AT&T Bell Labs were key players in developing the first packet-filtering
firewalls. These early solutions were relatively basic but marked a significant step in network
security by providing a barrier between trusted internal networks and external threats.
 Stateful Inspection Firewalls: By the early 1990s, firewalls evolved to include stateful
inspection technology. This allowed firewalls to monitor the state of active network
connections and filter packets not just by individual rules but based on the context of the
communication (i.e., tracking whether a packet was part of an established session). This was a
major improvement, providing better security with more dynamic, intelligent packet filtering.
 Proxy Firewalls: Around the mid-1990s, proxy firewalls were introduced. These firewalls
acted as intermediaries between users and the services they accessed online. By intercepting
all requests and responses, proxy firewalls could better control and filter traffic, adding an
extra layer of security. They also helped to mask internal network details from external users,
reducing the risk of attacks.
Next-Generation Firewalls (NGFWs): In the 2000s, firewalls evolved further
with the introduction of Next-Generation Firewalls (NGFWs). These firewalls went
beyond simple packet filtering and stateful inspection, incorporating advanced
security features such as:

• Deep Packet Inspection (DPI): Examining the content of data packets, not
just the headers, to detect and block malicious traffic.

• Intrusion Prevention Systems (IPS): Identifying and stopping known cyber


threats in real-time.Application-Level Control: Monitoring and controlling the
use of applications within the network, offering more granular protection
against specific app-based threats.
Click icon to add picture
RULES AND POLICIES OF FIREWALLS
 Rules:

 Firewalls operate based on a set of predefined rules that determine


whether to allow or block network traffic. These rules are created by
network administrators and are the foundation of how firewalls control
data flow.

 Parameters Used in Rules:

 iP Addresses: Source or destination of the traffic.

 Protocols: (e.g., TCP, UDP) used in communication.Ports: Specific port


numbers associated with services (e.g., 80 for HTTP, 443 for HTTPS).

 Traffic Direction: Inbound or outbound.


How Policies Are Defined Allow or Block Traffic:

Policies define whether certain traffic is allowed or blocked based on the specified

rules.

Default Policies: Many firewalls use a default deny-all policy, meaning only

explicitly allowed traffic is permitted, while everything else is blocked.


ROLE OF FIREWALLS IN NETWORK SECURITY

 Prevent Unauthorized AccessAccess Control

 Network SegmentationCreating Zones

 Logging and MonitoringTraffic Analysis

 Prevention of AttacksDefense Mechanism

 Compliance and Policy Enforcement Regulatory Compliance


LIMITATIONS OF FIREWALLS

 1. Not a Complete Solution Cannot prevent all attacks (e.g., phishing, social

engineering).

 2. Bypass by Encrypted Traffic Difficulty inspecting encrypted traffic (e.g.,

HTTPS).

 3. Misconfiguration Issues: Poorly configured rules can create vulnerabilities.

 4. Limited Insight into Application Behavior May not detect application-layer

attacks effectively.

 5. Performance Impact Can introduce latency, affecting network performance.


INTEGRATIONS WITH OTHER SECURITY TECHS
 Firewalls and Intrusion Detection/Prevention Systems
(IDS/IPS)Collaboration: Firewalls work alongside IDS/IPS to detect and
block threats in real-time, enhancing overall network security.
 Firewalls and VPNs
Secure Connections: Firewalls manage and filter VPN traffic, ensuring
secure remote access while protecting internal networks.
 Firewalls and Zero Trust Architecture:
Enhanced Security: In a Zero Trust model, firewalls enforce strict access
controls, verifying every user and device before granting access to
resources.
 firewalls and Endpoint Security:
Comprehensive Defense: Integration with endpoint security solutions
ensures that threats are detected at both the network perimeter and device
level.
 Firewalls and SIEM (Security Information and Event
Management:
Centralized Monitoring: Firewalls feed logs into SIEM systems for
FUTURE OF FIREWALLS
 1. AI and Machine Learning Enhanced threat detection and automated

responses.

 2. Cloud-Native Firewalls Tailored for cloud environments and hybrid

systems.

 3. Improved Visibility Better analytics for monitoring network traffic.

 4. Integration with Security Solutions Unified defense with other security

tools.

 5. Zero Trust Adoption Continuous verification of users and devices.


CONCULUSION
 Firewalls are a key component of network security, acting as the first line of
defense.
 They monitor, filter, and control incoming and outgoing network traffic based
on predefined security rules.
 Firewalls protect networks from unauthorized access, malware, and other
cyber threats.
 While crucial, firewalls must be part of a broader, layered security strategy to
address all types of threats.
 Proper configuration and regular updates are essential for maintaining
firewall effectiveness.
 Integration with other security measures like antivirus, intrusion detection
systems, and encryption is important.
 Firewalls help ensure the integrity, confidentiality, and availability of data
within a network.

You might also like