Firewall

Only available on StudyMode
  • Download(s) : 99
  • Published : May 8, 2013
Open Document
Text Preview
A Seminar report
On

Firewall Technology

Submitted By Guided By Concern Faculty

Malav shahMr.J.B.Bhatia Ms.Shivani Desai

2008-09
Department of Computer Science and Engineering
Institute of Technology
Nirma University for Science and Technology

Nirma University of Science and Technology

This is to certify that Mr. Malav Shah bearing Roll No. 07BIT042 has satisfactorily completed his seminar in the Topic Firewall technology as part of the 5th semester curriculum for the subject Seminar.

Date of Submission: 01-09-2009

Guided By:Concerned Faculty:
Mr.J.B.BhatiaMs.Shivani Desai

ACKNOWLEDGMENT

I would like to express my salutation to god for giving me the strength, confidence and moral boost to successful completion of this Seminar. Teacher is a guide, philosopher and friend, which I had experienced in my respected mam Ms.Sivani Desai and esteemed guide Mr.J.B.Bhatia, Department of Computer Science engineering, Nirma University with deep sense of gratitude. I thank him for providing unceasing encouragement, precious and erudite suggestions and directions, constant and untiring guidance along with the freedom of work. I also thank him for providing with the best of his idea and best facilities in the institute for completion of this work. His constant support and guidance has made it possible for us to make this seminar better one.

Date: 01/09/2009Malav Shah

Nirma University(07BIT042)

Index

1. Abstract……………………………………………………………………………… 5

2. Introduction…………………………………………………………………………..6

2.1. Security Threats from connecting to the Internet………………………….....6
2.2. What is Firewall………………………………………………………………7
2.3. Pros of Firewall……………………………………………………………….8
2.4. Cons of Firewall………………………………………………………………8 3. Models, Layer and Firewall…………………………………………………………9

4. Types of Firewall……………………………………………………………………10

4.1. Packet Filtering based Firewall………………………………………………10
4.2. Problem with Packet Filtering Firewall……………………………………...11
4.3. Stateful inspection Firewall………………………………………………….12
4.4 Application level Firewall……………………………………………….…...12
4.4.1 Proxy service …………………………………………………………..12 4.4.2. FTP…………………………………………………………………….13 4.4.3. SMTP ………………………………………………………………....13 4.4.4. TELNET ……………………………………………………………....13 4.4.5. HTTP ………………………………………………………………….13

5.Content Filtering …………………………………………………………………..14

6.Firewall Configuration ……………………………………………………………15

6.1.The Dual Homed Gateway ………………………………………………….15
6.2The Screened Host Gateway ………………………………………………..16
6.3The Screened Subnet Gateway ……………………………………………...17
6.4Double Proxing and DMZ …………………………………………………..17

7.Future Technologies...……………………………………………………………....18

8.Conclusion ………………………………………………………………………….19

9.References ………………………………………………………………………….20

Abstract

This report provides an overview of the topic of network firewalls technology and security methods that they support. The reasons why a firewall is needed are given, plus the advantages and disadvantages of using a firewall. The components that comprise a firewall are introduced, along with different types of firewall at different layers are jotted down. Finally, typical firewall configurations are described, along with the advantages and disadvantages of each configuration.

2. Introduction

2.1. Security Threats from connecting to the Internet

Most organizations today have an internal network that interconnects their computer systems. There is usually a high degree of trust between the computer systems in the network, particularly if the network is private. However, many organizations now see the benefits of connecting to the Internet. But, the Internet is inherently an insecure network. Some of the threats inherent in the Internet include:

Weak or No Authentication required. Several services e.g. rlogin, require no password to be given when a user logs in....
tracking img