Want to create interactive content? It’s easy in Genially!

Get started free

Firewalls

Francesco Militano

Created on March 14, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Geniaflix Presentation

Vintage Mosaic Presentation

Shadow Presentation

Newspaper Presentation

Zen Presentation

Audio tutorial

Pechakucha Presentation

Transcript

Firewalls

classification, general information,vendors and products

By Francesco Militano A.S. 2024/2025

INDEX

Classifications

Vendors & Products

General information

Sitography

+ INFO

Software Firewall

Packet FilteringFirewall

+ INFO

+ INFO

HardwareFirewall

Types of firewall

+ INFO

+ INFO

ProxyFirewall

NGFW

Stateful inspectionFirewall

+ INFO

Sitography of this presentation

General information about firewalls: www.fortinet.comClassification of firewall: www.fortinet.com; www.techtarget.comImages: www.google.com Vendors: investor.fortinet.com; quarterlystics.com; businesswire.com

Who are the best vendors?

Cisco

Fortinet

Check Point Software

The best selling product is the cisco secure firewall(1200 series)

The best selling product is the FortiGate NGFW( FortiWiFi 60F)
the best selling product is the CheckPoint quantum 6200 security gateway

View the datasheet

view the datasheet

view the datasheet

What is a firewall ?

Next

Firewall is a either a hardware device and a software application that protect your pc and your network from attackers, that separates our internal network from an external one deemed unreliable. It regulates incoming and outgoing network traffic based on preset security rules.Its called fire-wall because it forms a wall between our network and the internet.

Firewall security rules are the settings that define how a firewall should handle incoming and outgoing network traffic. Firewall security rules can be divided into several categories, depending on the type of traffic they need to handle:

  1. Traffic filtering rules
  2. Access rules
  3. Monitoring and logging rules
  4. Rules for NAT
  5. Connection management rules

HOW does it works?

They inspect data packets, comparing them to predefined rules to determine whether to allow or block them. These rules can be based on various factors, such as source and destination IP addresses, ports, and protocols. Firewalls use techniques like packet filtering, proxy services, and stateful inspection to enforce these rules. By carefully scrutinizing network traffic and enforcing security rules, firewalls prevent unauthorized access, block malicious activities, and protect your system from a wide range of cyber threats. They act as a vital line of defense, safeguarding your sensitive data and ensuring a secure online environment.

Made by Sunnyclassroom

Proxy Firewall

  • Acts as an intermediary between client and server, filtering traffic at the application level.
  • It offers a high level of security, but it can introduce latency in connections.
  • ex.(Squid Proxy, Microsoft ISA Server).

Stateful Inspection Firewall

  • keeps track of active connections and only allows packets that belong to an already established session.
  • It is more secure than packet filtering, but can slow down traffic to increase analysis.

Hardware Firewall

  • physical devices dedicated to protecting the corporate network.
  • can handle large volumes of traffic with high performance.
  • ex.(Cisco PIX515e, SonicWall).

Cisco PIX515e

Software Firewall

  • installed on a computer or server to protect the system.
  • ex.(Windows Defender Firewall, McAfee).

Packet Filtering Firewall

  • It monitors network traffic by analyzing packets based on IP addresses, ports and protocols.
  • It is fast and efficient, but it cannot analyze the traffic content.
  • ex.(ACL in router).

New Generation Firewall

  • Combines stateful inspection capabilities with DPI and threat detection.
  • Can identify malware, advanced attacks and filter specific web content.
  • ex.(Fortinet, Paloalto networks).