Want to create interactive content? It’s easy in Genially!
Firewalls
Francesco Militano
Created on March 14, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Geniaflix Presentation
View
Vintage Mosaic Presentation
View
Shadow Presentation
View
Newspaper Presentation
View
Zen Presentation
View
Audio tutorial
View
Pechakucha Presentation
Transcript
Firewalls
classification, general information,vendors and products
By Francesco Militano A.S. 2024/2025
INDEX
Classifications
Vendors & Products
General information
Sitography
+ INFO
Software Firewall
Packet FilteringFirewall
+ INFO
+ INFO
HardwareFirewall
Types of firewall
+ INFO
+ INFO
ProxyFirewall
NGFW
Stateful inspectionFirewall
+ INFO
Sitography of this presentation
General information about firewalls: www.fortinet.comClassification of firewall: www.fortinet.com; www.techtarget.comImages: www.google.com Vendors: investor.fortinet.com; quarterlystics.com; businesswire.com
Who are the best vendors?
Cisco
Fortinet
Check Point Software
The best selling product is the cisco secure firewall(1200 series)
The best selling product is the FortiGate NGFW( FortiWiFi 60F)
the best selling product is the CheckPoint quantum 6200 security gateway
View the datasheet
view the datasheet
view the datasheet
What is a firewall ?
Next
Firewall is a either a hardware device and a software application that protect your pc and your network from attackers, that separates our internal network from an external one deemed unreliable. It regulates incoming and outgoing network traffic based on preset security rules.Its called fire-wall because it forms a wall between our network and the internet.
Firewall security rules are the settings that define how a firewall should handle incoming and outgoing network traffic. Firewall security rules can be divided into several categories, depending on the type of traffic they need to handle:
- Traffic filtering rules
- Access rules
- Monitoring and logging rules
- Rules for NAT
- Connection management rules
HOW does it works?
They inspect data packets, comparing them to predefined rules to determine whether to allow or block them. These rules can be based on various factors, such as source and destination IP addresses, ports, and protocols. Firewalls use techniques like packet filtering, proxy services, and stateful inspection to enforce these rules. By carefully scrutinizing network traffic and enforcing security rules, firewalls prevent unauthorized access, block malicious activities, and protect your system from a wide range of cyber threats. They act as a vital line of defense, safeguarding your sensitive data and ensuring a secure online environment.
Made by Sunnyclassroom
Proxy Firewall
- Acts as an intermediary between client and server, filtering traffic at the application level.
- It offers a high level of security, but it can introduce latency in connections.
- ex.(Squid Proxy, Microsoft ISA Server).
Stateful Inspection Firewall
- keeps track of active connections and only allows packets that belong to an already established session.
- It is more secure than packet filtering, but can slow down traffic to increase analysis.
Hardware Firewall
- physical devices dedicated to protecting the corporate network.
- can handle large volumes of traffic with high performance.
- ex.(Cisco PIX515e, SonicWall).
Cisco PIX515e
Software Firewall
- installed on a computer or server to protect the system.
- ex.(Windows Defender Firewall, McAfee).
Packet Filtering Firewall
- It monitors network traffic by analyzing packets based on IP addresses, ports and protocols.
- It is fast and efficient, but it cannot analyze the traffic content.
- ex.(ACL in router).
New Generation Firewall
- Combines stateful inspection capabilities with DPI and threat detection.
- Can identify malware, advanced attacks and filter specific web content.
- ex.(Fortinet, Paloalto networks).