Outline of Presentation
The Nature of Today’s Attackers
What Is a Firewall ?
What Is a Firewall ?
Firewalls History
Firewalls History
Firewalls History
What Firewalls Cannot Do
What Firewalls Cannot Do
How Firewalls Work
How Firewalls Work
Types of Firewalls
Types of Firewalls
Packet Filtering Firewall
Packet Filtering Firewall
Packet Filtering Firewall
Packet Filtering Firewall
Packet Filtering Firewall
Packet Filtering
Packet Filtering
Stateful Packet Inspection
Stateful Packet Inspection Firewall
Stateful Packet Inspection Firewall
Stateful Packet Inspection Firewall
Stateful Packet Inspection Firewall
Stateful Packet Inspection
Stateful Packet Inspection
Application Gateways/Proxies
Application Gateways/Proxies
Application Gateways/Proxies
Application Gateways/Proxies Firewall
Application Gateways/Proxies Firewall
Application Gateways/Proxies
Application Gateways/Proxies
Adaptive Proxies
Circuit-level Gateway
Types of Firewalls
Types of Firewalls
Types of Firewalls
Types of Firewalls
Firewall Architecture
Packet Filtering Router
Screened Host (Bastion Host)
Screened Host (Bastion Host)
Dual-homed Gateway
Screened Subnet or Demilitarized Zone (DMZ)
Do you need a firewall?
Do you need a firewall?
Do you need a firewall?
Selecting Firewall Solution
Security Policy
Security Policy
Implementations
Conclusion
Q&A