Apr 05, 2018
7/31/2019 Firewall Course Work
1/15
Date: 16/03/2012
Module Tutor: Bo Li
Module code:CC3021N
Comparison of different types of firewall | Abdul Mannan 06037871
LONDONMETROPOLITANUNIVERSITY
Principles of Network Security: CWFirewall
7/31/2019 Firewall Course Work
2/15
Abdul Mannan Student ID 06037871
ContentsContents .............................................................................................. 2
1 Introduction ...................................................................................... 3
2 Literature review .............................................................................. 4
2.1 Firewall.......................................................................................................... 4
2.1.1 Hardware Firewall.................................................................................... 4
2.2 Purpose of Firewall........................................................................................ 7
2.3 How does it work ........................................................................................... 8
2.4 Types of firewall ........................................................................................... 8
2.4.1 Packet Filtering ....................................................................................... 8
2.4.2 Circuit-Level Gateways .......................................................................... 10
2.4.3 Application Gateways ............................................................................ 10
2.4.4 Stateful Multilayer Inspection ................................................................ 12
3 Comparison ..................................................................................... 13
4 Conclusion ......................................................................................13
4.1 Recommendation ....................................................................................... 13
2 | P a g e
7/31/2019 Firewall Course Work
3/15
Abdul Mannan Student ID 06037871
Abstract
In this report my main aim is to assume that I am working as a consultant for a
network security organisation and prepare a report comparing different type of
firewalls available.by using the internet and other sources I will create a report
that will give the strengths and weakness of each product, I will also state wherethis product would generally be used.
1 Introduction
The internet has millions of data available for free to users to consume and share
it has evolved to such an extent we now play games, stream live TV, and even talk
using the internet on the go most are completely free, for many of us it has
become so essential that we cant get on with our normal lives but yet by
connecting to the internet has become a risk our confidential data could be
available to hackers or intruders if we dont have a firewall in place.
Threat has moved slowly from being most dominant in lower layer of the network
traffic to the application layer, this has reduced the effectiveness of firewall in
stopping threats that is carried through the network communications but firewall is
still needed to stop the threats that continue to work at the lower layer of network
traffic .firewall is good at providing some protection at the application layer
supplementing the capabilities of other network security technologies (CNG)
Firewall is the most basic form of protection users can have for their network andthere are many types of firewall to choose from depending on the network.
Firewall watches the traffic and examines suspicious activity and used for two
main reason
To keep people (intruders, hackers) out
To keep people (students, lecturers) in (VSC)
3 | P a g e
7/31/2019 Firewall Course Work
4/15
Abdul Mannan Student ID 06037871
2 Literature review
2.1 Firewall
Firewall can be hardware or software program that prevents unauthorised access
to or from a network and it must have at least two network interfaces, one for thenetwork it is intended to protect, and one for the network it is exposed to.
Firewall also control the flow of network traffic between network and hosts that
employs differing security postures at one time most firewall was deployed at the
network perimeters.(VSC) This provided some form of protection for internal host
but did not recognise all forms of attacks, and attacks sent from one internal host
to another do no pass through the network firewall because of this reason network
designers now include firewall functionality at other places other than the network
perimeter to provide additional layer of security and also to protect mobile devices
that are place onto external networks.(CNG)
Firewall is used to safeguard the data within the network all data entering or
leaving the network will have to pass through a security check (firewall) which will
examine each packet that do no not meet the specified security criteria and then
will be rejected and denied access. The firewall is part of an overall security policy
that creates a perimeter defence designed to protect the information resources of
the network. (LSC)
The firewall will sit at the junction point or gateway between the two networks,
normally a private network and a public network such as the Internet. The earliest
firewalls were just routers. The term firewall comes from the fact that bysegmenting a network into different physical sub networks, they will limit the
damage caused that could of spread from one subnet to another just like fire doors
or firewalls. Below I have included diagrams showing the connection taking place.
(VSC)
2.1.1 Hardware Firewall
The hardware firewall will be often called a network firewall because its an
external box sitting between the internet and the computer for home network they
are normally integrated in the routers itself. This will allow you to connect on the
public network (internet) and even share the connection with other computers.
(CSR)
2.1.1.1 Advantages
Hardware firewall can protect an entire network compared to software firewall
which is thumbs up for big companies that would like minimize their spending
because firewall dont run on the computer it doesnt slow it down, hardware
firewall work more efficiently for businesses that use high speed connection such
as DSL or cable modem and also hardware firewall is harder to reach and also
difficult for malicious software to turn it off.
4 | P a g e
7/31/2019 Firewall Course Work
5/15
Abdul Mannan Student ID 06037871
2.1.1.2 Disadvantages
Hardware firewalls can be expensive at first and might be more difficult to
configure and hardware firewalls treat outgoing traffic from the local network as
safe, which can be a hazard if malware, such as a worm, penetrates your network
and attempts to connect to the Internet (TIC)
(VSC)
Products for hardware firewalls
UTM10EW-100EUS - Netgear NG Prosecure UTM10 Hardware Firewall inc 1YR
Email, Web & Maintenance/Support Subscription
The ProSecure UTM series of all-in-one gateway security has a combination of
security options to keep business safe and secure from the Web, email, and
network threats. Malware hosted on Web pages, phishing attacks, spam, virus
infected emails, hackers, and denial-of-service attacks,
Because comprehensive network security requires a lot of processing power to
examine the network in real time this all in one security solution is all a network
needs.
5 | P a g e
7/31/2019 Firewall Course Work
6/15
Abdul Mannan Student ID 06037871
2.1.2 Software FirewallSoftware firewall work in a similar manner as the hardware firewall by monitoring
and blocking data that comes in to the computer via public networks but software
firewalls need to be installed as a program in to the computer. (AWC)
2.1.2.1 Advantages
Because software firewall runs on a computer it can get more information about
the network traffic and the ports it is using and familiarise with application that are
running so there are no errors based on this a software firewall can allow or block
traffic overall software firewall is able to take and investigate further at the
malicious traffic and have a report of it (SLB)
2.1.2.2 Disadvantages
One of the main disadvantages of software firewall is that it only protects the
machine that the software is installed on and for multiple implementations thesoftware has to be configured individually that will take time and can get
expensive. (SLB)
(VSC)
Products for software firewall:
6 | P a g e
7/31/2019 Firewall Course Work
7/15
Abdul Mannan Student ID 06037871
Zone alarm firewall
Blocks hackers and prevents viruses & spyware from stealing your personal dataand sending it out to the Internet zone alarm has 2-Way Firewall (Inbound &
Outbound) Stops Internet attacks at the front door and even catches thieves on
their way out. Our 2-way firewall proactively protects against inbound and
outbound attacks while making you invisible to hackers.
Inbound & Outbound - monitors and blocks threat traffic in or out.
Full Stealth Mode - makes you invisible to hackers
Kill Cont