Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Computer Science Clay
Active In SP

Posts: 712
Joined: Jan 2009
25-02-2009, 12:23 AM


The Firewalls and Internet Security seminar and presentation defines three basic types of firewalls: packet filters, circuit level gateways, and application gateways. Of course there are also hybrid firewalls, which can be combinations of all three. Packet filter gateways are usually comprised of a series of simple checks based on the source and destination IP address and ports. They are very simple to the user since it will probably not even realize that the checks are taking place (unless of course it was denied!!). However, that simplicity is also their biggest problem: there is no way for the filter to securely distinguish one user from another. Packet filters are frequently located on routers and most major router vendors supply packet filters as part of the default distribution.

You may have heard of smart packet filters. Smart packet filters are really not very different from simple packet filters except they have the ability to interpret the data stream and understand that other connections, which would normally be denied, should be allowed (e.g. ftp's PORT command would be understood and the reverse connection allowed). Smart packet filters, however, still cannot securely distinguish one user on a machine from another. Brimstone incorporates a very smart and configurable application layer filter.Circuit-level gateways are much like packet filters except that they operate at a different level of the OSI protocol stack. Unlike most packet filters, connections passing through a circuit-level gateway appear to the remote machine as if they originated from the firewall. This is very useful to hide information about protected networks.

Socks is a popular de-facto standard for automatic circuit-level gateways. Brimstone supports both Socks and a manual circuit-level gateway. Application gateways represent a totally different concept for firewalls. Instead of a list of simple rules which control which packets or sessions should be allowed through, a program accepts the connection, typically performs strong authentication on the user which often requires one-time passwords, and then often prompts the user for information on what host to connect to. This is, in some senses, more limited than packet-filters and circuit-level gateways since you must have a gateway program for each applications (e.g. telnet, ftp, X11, etc).
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar topics on firewalls, firewalls types, seminar for firewalls, firewalls for home, definition of proxy firewalls, firewalls, firewalls for networks ppt,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  FIREWALLS ABSTRACT study tips 0 245 22-05-2013, 04:12 PM
Last Post: study tips
  A TECHNICAL SEMINAR ON FIREWALLS study tips 0 241 09-05-2013, 02:24 PM
Last Post: study tips
  Security Technology: Firewalls and VPNs pdf project girl 0 352 23-01-2013, 10:20 AM
Last Post: project girl
  Network Security And Firewalls ( Download Full Seminar Report ) computer science crazy 6 10,828 21-01-2013, 04:49 PM
Last Post: project girl
  Performance Modeling and Analysis of Network Firewalls project girl 0 661 02-01-2013, 10:37 AM
Last Post: project girl
  ppt on Firewalls project girl 0 410 03-12-2012, 03:02 PM
Last Post: project girl
  FIREWALLS project uploader 0 312 20-08-2012, 11:07 AM
Last Post: project uploader
  Seminar Firewalls ppt seminar flower 0 611 07-08-2012, 01:50 PM
Last Post: seminar flower
  The Geometric Efficient Matching Algorithm for Firewalls uploader 0 494 16-05-2012, 04:00 PM
Last Post: uploader
  Data Security in Local Network using Distributed Firewalls computer science crazy 9 7,629 03-02-2012, 10:32 AM
Last Post: seminar addict