Final Firewalls Report
Final Firewalls Report
“INTRODUCTION TO FIREWALLS”
Submitted in partial fulfilment for the award of the degree of
BACHELOR OF ENGINEERING
in
COMPUTER SCIENCE & ENGINEERING
Submitted By
PALLAVI S
[4MU22CS410]
Assistant Professor
CERTIFICATE
This is certified that the Technical Seminar Report “INTRODUCTION TO FIREWALLS””
is a bonafide work carried out by PALLAVI S[4MU22CS410] of VIII semester Department
of Computer Science & Engineering, as prescribed by Visvesvaraya Technological
University, Belagavi, during the year 2024-25. It is certified that all the suggestions and
corrections indicated have been incorporated in the report. The Technical Seminar report has
been approved as it satisfies the requirements with the respect to seminar work prescribed for
the above said degree.
………………………………… ….………………………………
Signature of the staff Signature of HOD
Prof Prashanth Kumar A P Dr Lakshmi Durga
Asst. Prof, Dept of CSE Associate Professor & Head
External Viva-Voce
Name of the Examiners Signature with Date
1.
2.
ACKNOWLEDGEMENT
The joy and satisfaction that accompany the successful completion of any task would be
incomplete without the mention of the people who made it possible.
We would like to express our gratitude to our principal, Dr D J Ravi, for providing us a
congenial environment for engineering studies and also for having showed us the way to carry
out the Technical Seminar.
We consider it a privilege and honour to express our sincere thanks to Dr Lakshmi Durga,
Professor and Head, Department of Computer Science & Engineering for his support and
valuable guidance throughout the tenure of this Technical Seminar.
We intend to thank all the Teaching and Non-Teaching staffs of our Department of Computer
Science & Engineering for their immense help and co-operation.
Finally we would like to express our gratitude to our parents and friends who always stood by
us.
Thank You
PALLAVI S
[4MU22CS410]
ABSTRACT
A firewall is a critical security system designed to protect computer networks from unauthorized
access and cyber threats. It serves as a barrier between a trusted internal network and untrusted
external networks, such as the internet. The primary function of a firewall is to monitor and filter
incoming and outgoing traffic based on predetermined security rules, ensuring that malicious traffic
is blocked while allowing legitimate communication to flow.
In this seminar, we will explore the different types of firewalls, including packet filtering, stateful
inspection, and proxy firewalls, as well as the evolution of firewall technology from traditional
network protection to modern, next-generation solutions. We will also delve into the role of firewalls
in today’s digital landscape, covering their integration with other security tools like intrusion
detection systems (IDS) and intrusion prevention systems (IPS), and the importance of configuring
and managing firewalls effectively to mitigate risks such as data breaches and cyberattacks.
CHAPTER 1
INTRODUCTION
In an era where cyber threats are constantly evolving, securing computer networks has become a top priority
for organizations and individuals alike. A firewall is a fundamental security system designed to protect networks
from unauthorized access, cyberattacks, and malicious activities. Acting as a protective barrier, a firewall
controls the flow of traffic between a trusted internal network and untrusted external networks, such as the
internet, by enforcing predefined security policies.
Firewalls play a crucial role in monitoring and filtering network traffic, allowing legitimate communication
while blocking potentially harmful data packets. Over the years, firewall technology has evolved from basic
packet-filtering mechanisms to advanced, next-generation firewalls (NGFWs) that integrate with security
solutions like intrusion detection systems (IDS) and intrusion prevention systems (IPS). These advancements
enable organizations to enhance network security, detect threats in real-time, and prevent data breaches.
In this seminar, we will explore the different types of firewalls, their working principles, and best practices
for effective firewall management. By understanding how firewalls contribute to modern cybersecurity
frameworks, participants will gain valuable insights into implementing robust security measures for both
enterprise and personal networks.
Firewalls are an essential component of network security, acting as a barrier between trusted and untrusted
networks to protect against unauthorized access, cyberattacks, and malicious activities. They monitor and control
incoming and outgoing traffic based on predefined security rules, ensuring only legitimate communication is
allowed while blocking potential threats. Firewalls can be categorized into different types, including packet-
filtering firewalls, stateful inspection firewalls, proxy firewalls, next-generation firewalls (NGFWs), and cloud-
based firewalls. Each type functions differently, with some focusing on filtering individual data packets and
others providing advanced security features like deep packet inspection, intrusion prevention, and application-
layer security.
In the modern digital era, organizations and individuals face an increasing number of cybersecurity threats,
including unauthorized access, data breaches, malware attacks, and network intrusions. As cyber threats evolve
in complexity, traditional security measures alone are no longer sufficient to protect sensitive information and
critical infrastructure.
This seminar aims to address the importance of firewalls in cybersecurity, explore their types, evolution, and
role in modern security frameworks, and discuss best practices for firewall configuration and management to
enhance network security and mitigate cyber threats. By gaining a comprehensive understanding of firewalls,
participants will be better equipped to implement robust security measures in both enterprise and personal
environments.
CHAPTER 2
TYPES OF FIREWALLS
1. Packet-Filtering Firewalls
2. Stateful Inspection Firewalls
3. Web Application Firewalls
4. Next-Generation Firewalls (NGFWs)
5. Circuit-Level Gateways
6. Software Firewalls
7. Hardware Firewalls
8. Cloud Firewalls
1. Packet-Filtering Firewalls:
Packet-filtering firewalls are one of the earliest and most basic forms of firewalls. They operate
at the network layer (Layer 3) and inspect packets based on criteria such as IP addresses, port numbers,
and protocols. These firewalls use predefined rules to determine whether a packet should be allowed
5. Circuit-Level Gateways:
Circuit-level gateways operate at the session layer (Layer 5) and monitor the TCP handshake
process to ensure that only legitimate connections are established. Unlike proxy firewalls, they do not
inspect the actual data within packets but verify the legitimacy of sessions before allowing data transfer.
While they are efficient and lightweight, they lack deep packet analysis capabilities. Each type of firewall
has its strengths and weaknesses, and organizations often use a combination of these firewalls to achieve
multi-layered security.
Software firewalls are installed on operating systems (OS) and provide security at the host level. Unlike
hardware firewalls, they do not require dedicated network appliances. Examples include Windows
Firewall, Linux iptables, and macOS PF (Packet Filter).
7. Hardware Firewalls:
Hardware firewalls are physical devices that provide dedicated network security by monitoring
and filtering traffic. These firewalls are often deployed in enterprise networks, data centers, and cloud
environments. They are designed for high-performance traffic filtering and centralized security
management.
8. Cloud Firewalls:
Cloud-based firewalls, also known as Firewall-as-a-Service (FWaaS), are hosted in the cloud
and provide firewall functionality as a managed service. These firewalls offer scalability, flexibility,
and remote protection without requiring on-premises hardware. They are ideal for organizations with
distributed networks, remote users, and cloud infrastructure. Cloud firewalls are integrated with Secure
Access Service Edge (SASE) solutions to enhance cloud security.
CHAPTER 3
SYSTEM DESIGN
The open network represents the external environment, such as the internet, which consists of a
mix of trusted, untrusted, and malicious entities. It includes legitimate users accessing online services,
cybercriminals attempting unauthorized access, and potential network threats like malware, phishing
attacks, and Distributed Denial of Service (DDoS) attacks. Since the internet is an uncontrolled
environment, firewall systems play a crucial role in filtering and controlling traffic before it reaches
internal network resources.
A firewall acts as a security checkpoint between internal and external networks, allowing or
blocking traffic based on predefined security policies. It examines data packets passing through and
determines whether to allow, deny, or log the communication. Firewalls can operate at different layers
of the OSI model, including:
o Network Layer (Packet Filtering Firewalls): Examines IP addresses and ports to allow or block
traffic.
o Transport Layer (Stateful Inspection Firewalls): Monitors the connection state to prevent
unauthorized access.
o Application Layer (Proxy Firewalls): Filters traffic based on application behavior, inspecting
content such as HTTP, FTP, and DNS requests.
o Next-Generation Firewalls (NGFWs): Advanced firewalls that include deep packet inspection
(DPI), intrusion prevention (IPS), malware protection, and AI-driven threat intelligence.
A DMZ is a special subnetwork designed to isolate public-facing services from the internal network
while still providing access to external users. It acts as a buffer zone, hosting services like:
• Web Servers – To handle external requests for company websites and online portals.
• Mail Servers – To manage corporate email communications securely.
• DNS Servers – To translate domain names into IP addresses for seamless web access.
Since DMZ servers interact with both external and internal networks, strict firewall rules are applied
to limit exposure to security threats. If a cyberattack occurs on a DMZ-based service, the internal
network remains protected from direct compromise.
A router is responsible for forwarding data packets between different networks. In a firewall
system, routers can be configured with Access Control Lists (ACLs) to provide an additional security
layer. ACLs help filter incoming and outgoing traffic based on rules such as:
The internal network consists of all trusted and confidential resources, including:
• Databases – Storing sensitive information like customer data, financial records, and business
intelligence.
• Enterprise Applications – Software tools such as ERP (Enterprise Resource Planning) and CRM
(Customer Relationship Management) that need to be protected from unauthorized access.
Access to internal network resources is strictly regulated using firewalls, VPNs (Virtual Private
Networks), endpoint security solutions, and identity authentication mechanisms (MFA – Multi-Factor
Authentication).
CHAPTER 4
WORKING OF FIREWALLS
Figure shows the use of a firewall in a network. It shows when the user tries to connect to the internet,
it first needs to 978-1-6654-9648-3/22/$31.00 c pass through the firewall. One of the known functionality of a
f irewall is Access Control List, which allows users to set rules to send and receive data moreover,
communication rules as Allow or Deny. Mainly the firewall is used to monitor and filter the traffic going in
and out of it. Whenever a packet comes to a f irewall, it first inspects whether it is allowed to communicate
with the unreliable external network or not. Suppose a user tries to open google inside its system then, the
request first goes to the firewall & it will check its policy and find out whether the user is allowed or not. If
allowed then, it will pass that request to a router then the router finds the best path to reach google. In the same
way, if the website is not allowed, the firewall will block the request. Red Arrows in Fig. 1 represent requests
obscured by the firewall, and green arrows represent requests allowed by the firewall. If the router cannot find
the path for the request, it will also send a message to the firewall that the website is unavailable. And
unreachable website requests are represented using red color arrows. So, here in this paper, we will discuss the
classification, advantages, features, and comparison of open-source firewalls. Our contribution in this paper is
to find out which open source firewall is best among the most popular ones. To do this, we have performed
several attacks on the firewall named Ping of Death, Flooding, Brute Force Attack, and Port Scanning and
compared their results.
Firewalls are essential security solutions that protect computer networks from cyber threats by monitoring
and controlling network traffic. They are used in various domains to safeguard data, prevent unauthorized
access, and ensure secure communication. Below are the key applications of firewalls:
Enterprises often use Next-Generation Firewalls (NGFWs) that provide intrusion prevention, deep packet
inspection, and threat intelligence to protect against advanced cyber threats.
Firewalls in data centers work alongside Intrusion Detection Systems (IDS) and Intrusion Prevention Systems
(IPS) to provide multi-layered security.
With the rise of cloud computing, firewalls are essential for securing cloud-based applications and
services. They assist in:
Cloud-based firewalls (Firewall as a Service - FWaaS) help organizations secure remote workloads and
applications hosted on platforms like AWS, Microsoft Azure, and Google Cloud.
Industrial and IoT firewalls are designed to operate in low-latency, high-performance environments while
maintaining robust security.
Firewalls with AI-powered threat detection are used to monitor and prevent sophisticated cyber threats
targeting national security.
Firewalls are integrated into home routers and personal devices to protect against cyber threats. They
help in:
• Securing smart home devices like security cameras, thermostats, and voice assistants.
Many Wi-Fi routers come with built-in firewalls that allow users to configure parental controls, port
restrictions, and MAC address filtering for added security.
Organizations use firewalls with email filtering capabilities to protect against cyber threats from phishing,
spam, and malware-laden emails. Firewalls are used to:
• Filter out phishing emails that try to steal personal or financial information.
Firewalls work alongside Secure Web Gateways (SWG) and Email Security Gateways (ESG) to enhance
protection against online threats.
Firewalls help in detecting and blocking malware, ransomware, and spyware before they can enter a network.
They provide:
• Sandboxing techniques to isolate and analyze suspicious files before allowing them into the network.
• Integration with Endpoint Detection and Response (EDR) solutions for enhanced threat prevention.
Advanced Next-Generation Firewalls (NGFWs) use AI-driven threat intelligence to identify and mitigate
malware attacks proactively.
Industries with strict cybersecurity regulations use firewalls to enforce data protection policies and comply
with legal requirements. Firewalls help in:
DEPT OF CSE, MRIT, MANDYA 2024-25 14
INTRODUCTION TO FIREWALLS
• Restricting access to sensitive data based on user roles.
o GDPR (General Data Protection Regulation) – Protecting user privacy and personal data.
Firewalls help organizations maintain compliance and protect against cyber risks associated with regulatory
violations.
CHAPTER 5
1. Network Security: Firewalls provide a barrier between a trusted network and an untrusted network, such as
the internet.
2. Access Control: Firewalls can control incoming and outgoing network traffic based on predetermined
security rules.
3. Protection from Malware: Firewalls can block malicious software, such as viruses and Trojan horses, from
entering a network.
4. Intrusion Prevention: Firewalls can detect and prevent intrusion attempts, such as hacking and denial-of-
service (DoS) attacks.
5. Logging and Auditing: Firewalls can log and audit network traffic, providing valuable information for
security monitoring and incident response.
6. Virtual Private Network (VPN) Support: Firewalls can support VPNs, allowing remote users to securely
access a network.
7. Stateful Inspection: Firewalls can track the state of network connections, ensuring that incoming traffic is
legitimate and expected.
1. Complexity: Firewalls can be complex to configure and manage, requiring specialized knowledge and skills.
2. Performance Impact: Firewalls can introduce latency and reduce network performance, especially if they
are not properly configured.
3. Cost: Firewalls can be expensive to purchase and maintain, especially for large and complex networks.
4. False Positives: Firewalls can block legitimate traffic, resulting in false positives and potential disruptions
to business operations.
6. Limited Protection: Firewalls are not foolproof and can be bypassed by sophisticated attackers using
techniques such as IP spoofing and DNS tunneling.
7. Interoperability Issues: Firewalls can have interoperability issues with certain network protocols and
applications, requiring additional configuration and troubleshooting.
FUTURE SCOPE
The future of firewalls holds much promise, with emerging trends and advanced security features on
the horizon. Artificial intelligence (AI) and machine learning (ML) integration are expected to improve
threat detection, incident response, and security analytics. Cloud-based firewalls will become more
prevalent, offering greater scalability, flexibility, and cost-effectiveness. Additionally, software-defined
networking (SDN) integration will provide more granular security control and visibility. The growing need
for Internet of Things (IoT) security will also drive the development of firewalls designed to protect IoT
devices and networks from emerging threats
CONCLUSION
Development of Linux based firewalls is important goal for both, open-source projects and for
enterprise level products. So, there is no doubt that at some point iptables will be replaced by another
packet filter or it will be significantly upgraded. However, transition to any replacer will be driven mostly
by enterprise projects. For make them interested in such big changes iptables successor should not only
overcome iptables architectural limitations but bring significant performance increase in all use case
scenarios. Netfilter’s new packet filter nftables indeed brings some new useful features and solves iptables
drawbacks [11]. As it is shown in results of our experiment and other similar work, iptables outperforms
nftables. It is able to process packets with greater number of configured rules and at the same time show
better throughput. It is possible to improve nftables performance by configuring multiple targets in single
nftables rules. However, by using ipset extension for iptables same result can be achieved. And it still will
be a drawback for nftables in systems where its design foresees configuring single rule for each target. So,
it is not a surprise why community is looking for new technics and solutions how to make Linux packet
filtering better.
REFERENCES
[1] Cisco. (2020) Cisco Annual Internet Report (2018-2023) White Paper. [Online]. Available:
https://www.cisco.com/c/en/us/solutions/collateral/executive perspectives/annual-internet-report/white-paper-
c11-741490.html
[3] J. C.A. Bambenek. (2007) ipables as a replacement for commerical enterprise firewalls. [Online]. Available:
https://www.linux.com/news/iptables-replacement-commercial enterprise-firewalls/
[8] Cisco.com. (2020) Cisco Nexus 9000 Series NX-OS Programmability Guide. [Online]. Available:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus900 0/sw/7-
x/programmability/guide/b_Cisco_Nexus_9000_Series_NX OS_Programmability_Guide_7x/NX_API.html
[9] F. Westphal. (2016) What comes after “ipables”? Its successor, of course “nftables”. [Online]. Available:
https://developers.redhat.com/blog/2016/10/28/what-comes-after iptables-its-successor-of-course-nftables/