Types Of Firewall Security

Views:
 
     
 

Presentation Description

Firewall is a network that is used to block certain types of network traffic. It is basically a security system that is designed to protect untrusted access on a private network. Firewall forms a barrier between a trusted and an untrusted network. We are going to tell you the various types of firewall security in this PPT

Comments

Presentation Transcript

Slide 1:

Types Of Firewall Security iberrywifisecurity.com 91-8872372233

Slide 2:

What Is Firewall? The word firewall means a network device that is used to block certain types of network traffic. Basically, firewall forms a barrier between a trusted and an untrusted network.

Slide 3:

Types Of Firewall

Slide 4:

Packet F iltering F irewall In this type of firewall, there are security rules that block traffic based on IP address and IP protocol. Filtering Rules are based on information contained in a network. Source IP address Destination IP address Source and destination transport level address IP protocol field Interface

Slide 6:

Stateful firewall A Stateful packet firewall tightens up the rules for TCP traffic by creating a directory of outound TCP connections. There is an entry for each established connection. This is like a packet filtering firewall, however it is more astute about monitoring dynamic associations.

Slide 8:

Deep packet inspection firewall Deep packet inspection is a form of computer network packet filtering that examines the data part of a packet as it passes an inspection point, searching for protocol non-compliance, viruses, spam, intrusions, or defined criteria to decide whether the packet may pass or if it needs to be routed to a different destination, or, for the purpose of collecting statistical information that functions at the Application layer of the OSI model .

Slide 10:

Application-aware firewall Similar to deep packet inspection, except that the firewall understands certain protocols and can parse them, so that signatures or rules can specifically address certain fields in the protocol.  The flexibility of this approach to computer firewall protection is great and permits the signatures or rules to be both specific and comprehensive.

Slide 12:

Application P roxy Firewall An application proxy goes about as a go-between for certain application activity, (for example, HTTP, or web, movement), catching all solicitations and approving them before passing them along. For an application proxy firewall to be viable as PC firewall insurance, it must have the capacity to comprehend the protocol totally and to uphold hindering on infringement of the protocol.

Slide 14:

iberrywifisecurity.com 91-8872372233 / iberrywifiservices / iberrysecurity Contact Us

authorStream Live Help