Professional Documents
Culture Documents
Hardware or Software
Permit, deny or proxy data Transfers traffic between different trust levels
Software loaded on a PC that performs a firewall function. There are many commercially available software firewall products. After loading on a PC, it may have to be configured correctly in order to perform optimally. Many operating systems contain a built-in software firewall
Protects ONLY that computer
Internet
Firewall
PC
Hardware device located between the Internet and a PC that performs a firewall function
Protects ALL of the computers that are behind
Internet
May perform Network Address Translation (NAT) which provides hosts behind the firewall with addresses in the "private address range". There are several commercially available hardware firewall products.
Firewall
DMZ
PC
PC
PC
PC
Packet Filters
Circuit Gateways Application Gateways
Examples
DNS uses port 53
No incoming port 53 packets except known trusted servers
Circuit-level gateways/proxies
Working on TCP level
FTP proxy
FTP daemon
Network Connection
Daemon spawns proxy when communication detected
Relays two TCP connections Imposes security by limiting which such connections are allowed Once created usually relays traffic without examining contents Typically used when trust internal users by allowing general outbound connections SOCKS commonly used for this
Protects from
Hackers breaking into your system Viruses and worms that spread across the Internet Outgoing traffic from your computer created by a virus infection
Software
VicomSoft
Symantec
Hardware
Linksys
SonicWall
Firewalls play an important role in establishing the first line of defense Combined with anti-spyware, anti-virus and anti-spam software, a firewall adds a layer of protection that increases your chance of staying safe online. But its not the wholesome solution for cyber threats.
Queries
THANK
YOU