Top Banner

of 15

Firewall Course Work

Apr 05, 2018

ReportDownload

Documents

  • 7/31/2019 Firewall Course Work

    1/15

    Date: 16/03/2012

    Module Tutor: Bo Li

    Module code:CC3021N

    Comparison of different types of firewall | Abdul Mannan 06037871

    LONDONMETROPOLITANUNIVERSITY

    Principles of Network Security: CWFirewall

  • 7/31/2019 Firewall Course Work

    2/15

    Abdul Mannan Student ID 06037871

    ContentsContents .............................................................................................. 2

    1 Introduction ...................................................................................... 3

    2 Literature review .............................................................................. 4

    2.1 Firewall.......................................................................................................... 4

    2.1.1 Hardware Firewall.................................................................................... 4

    2.2 Purpose of Firewall........................................................................................ 7

    2.3 How does it work ........................................................................................... 8

    2.4 Types of firewall ........................................................................................... 8

    2.4.1 Packet Filtering ....................................................................................... 8

    2.4.2 Circuit-Level Gateways .......................................................................... 10

    2.4.3 Application Gateways ............................................................................ 10

    2.4.4 Stateful Multilayer Inspection ................................................................ 12

    3 Comparison ..................................................................................... 13

    4 Conclusion ......................................................................................13

    4.1 Recommendation ....................................................................................... 13

    2 | P a g e

  • 7/31/2019 Firewall Course Work

    3/15

    Abdul Mannan Student ID 06037871

    Abstract

    In this report my main aim is to assume that I am working as a consultant for a

    network security organisation and prepare a report comparing different type of

    firewalls available.by using the internet and other sources I will create a report

    that will give the strengths and weakness of each product, I will also state wherethis product would generally be used.

    1 Introduction

    The internet has millions of data available for free to users to consume and share

    it has evolved to such an extent we now play games, stream live TV, and even talk

    using the internet on the go most are completely free, for many of us it has

    become so essential that we cant get on with our normal lives but yet by

    connecting to the internet has become a risk our confidential data could be

    available to hackers or intruders if we dont have a firewall in place.

    Threat has moved slowly from being most dominant in lower layer of the network

    traffic to the application layer, this has reduced the effectiveness of firewall in

    stopping threats that is carried through the network communications but firewall is

    still needed to stop the threats that continue to work at the lower layer of network

    traffic .firewall is good at providing some protection at the application layer

    supplementing the capabilities of other network security technologies (CNG)

    Firewall is the most basic form of protection users can have for their network andthere are many types of firewall to choose from depending on the network.

    Firewall watches the traffic and examines suspicious activity and used for two

    main reason

    To keep people (intruders, hackers) out

    To keep people (students, lecturers) in (VSC)

    3 | P a g e

  • 7/31/2019 Firewall Course Work

    4/15

    Abdul Mannan Student ID 06037871

    2 Literature review

    2.1 Firewall

    Firewall can be hardware or software program that prevents unauthorised access

    to or from a network and it must have at least two network interfaces, one for thenetwork it is intended to protect, and one for the network it is exposed to.

    Firewall also control the flow of network traffic between network and hosts that

    employs differing security postures at one time most firewall was deployed at the

    network perimeters.(VSC) This provided some form of protection for internal host

    but did not recognise all forms of attacks, and attacks sent from one internal host

    to another do no pass through the network firewall because of this reason network

    designers now include firewall functionality at other places other than the network

    perimeter to provide additional layer of security and also to protect mobile devices

    that are place onto external networks.(CNG)

    Firewall is used to safeguard the data within the network all data entering or

    leaving the network will have to pass through a security check (firewall) which will

    examine each packet that do no not meet the specified security criteria and then

    will be rejected and denied access. The firewall is part of an overall security policy

    that creates a perimeter defence designed to protect the information resources of

    the network. (LSC)

    The firewall will sit at the junction point or gateway between the two networks,

    normally a private network and a public network such as the Internet. The earliest

    firewalls were just routers. The term firewall comes from the fact that bysegmenting a network into different physical sub networks, they will limit the

    damage caused that could of spread from one subnet to another just like fire doors

    or firewalls. Below I have included diagrams showing the connection taking place.

    (VSC)

    2.1.1 Hardware Firewall

    The hardware firewall will be often called a network firewall because its an

    external box sitting between the internet and the computer for home network they

    are normally integrated in the routers itself. This will allow you to connect on the

    public network (internet) and even share the connection with other computers.

    (CSR)

    2.1.1.1 Advantages

    Hardware firewall can protect an entire network compared to software firewall

    which is thumbs up for big companies that would like minimize their spending

    because firewall dont run on the computer it doesnt slow it down, hardware

    firewall work more efficiently for businesses that use high speed connection such

    as DSL or cable modem and also hardware firewall is harder to reach and also

    difficult for malicious software to turn it off.

    4 | P a g e

  • 7/31/2019 Firewall Course Work

    5/15

    Abdul Mannan Student ID 06037871

    2.1.1.2 Disadvantages

    Hardware firewalls can be expensive at first and might be more difficult to

    configure and hardware firewalls treat outgoing traffic from the local network as

    safe, which can be a hazard if malware, such as a worm, penetrates your network

    and attempts to connect to the Internet (TIC)

    (VSC)

    Products for hardware firewalls

    UTM10EW-100EUS - Netgear NG Prosecure UTM10 Hardware Firewall inc 1YR

    Email, Web & Maintenance/Support Subscription

    The ProSecure UTM series of all-in-one gateway security has a combination of

    security options to keep business safe and secure from the Web, email, and

    network threats. Malware hosted on Web pages, phishing attacks, spam, virus

    infected emails, hackers, and denial-of-service attacks,

    Because comprehensive network security requires a lot of processing power to

    examine the network in real time this all in one security solution is all a network

    needs.

    5 | P a g e

  • 7/31/2019 Firewall Course Work

    6/15

    Abdul Mannan Student ID 06037871

    2.1.2 Software FirewallSoftware firewall work in a similar manner as the hardware firewall by monitoring

    and blocking data that comes in to the computer via public networks but software

    firewalls need to be installed as a program in to the computer. (AWC)

    2.1.2.1 Advantages

    Because software firewall runs on a computer it can get more information about

    the network traffic and the ports it is using and familiarise with application that are

    running so there are no errors based on this a software firewall can allow or block

    traffic overall software firewall is able to take and investigate further at the

    malicious traffic and have a report of it (SLB)

    2.1.2.2 Disadvantages

    One of the main disadvantages of software firewall is that it only protects the

    machine that the software is installed on and for multiple implementations thesoftware has to be configured individually that will take time and can get

    expensive. (SLB)

    (VSC)

    Products for software firewall:

    6 | P a g e

  • 7/31/2019 Firewall Course Work

    7/15

    Abdul Mannan Student ID 06037871

    Zone alarm firewall

    Blocks hackers and prevents viruses & spyware from stealing your personal dataand sending it out to the Internet zone alarm has 2-Way Firewall (Inbound &

    Outbound) Stops Internet attacks at the front door and even catches thieves on

    their way out. Our 2-way firewall proactively protects against inbound and

    outbound attacks while making you invisible to hackers.

    Inbound & Outbound - monitors and blocks threat traffic in or out.

    Full Stealth Mode - makes you invisible to hackers

    Kill Cont

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.