Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.

Slides:



Advertisements
Similar presentations
Cisco 2 - Routers Perrine. J Page 14/30/2015 Chapter 10 TCP/IP Protocol Suite The function of the TCP/IP protocol stack is to transfer information from.
Advertisements

Chapter 7 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain the need for the transport layer.  Identify.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Network Services Networking for Home & Small Business.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
CCNA 1 v3.1 Module 11 Review.
Firewalls and Intrusion Detection Systems
1 Pertemuan 05 Firewall Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Firewalls. What are firewalls? a hardware device and/or software program which sits between the Internet and the intranet, internet, of an organization.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 5 Copyright Prentice-Hall 2003
FIREWALL Mạng máy tính nâng cao-V1.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
Chapter 6: Packet Filtering
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Access Control List ACL. Access Control List ACL.
Network Services Networking for Home & Small Business.
Windows 7 Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
1 Version 3.0 Module 11 TCP Application and Transport.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
TCP/IP (Transmission Control Protocol / Internet Protocol)
ACCESS CONTROL LIST.
Security fundamentals Topic 10 Securing the network perimeter.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—3-1 Lesson 3 Cisco PIX Firewall Technology and Features.
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Security fundamentals
Application Layer Functionality and Protocols Abdul Hadi Alaidi
Instructor Materials Chapter 5 Providing Network Services
CCENT Study Guide Chapter 12 Security.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Networking for Home and Small Businesses – Chapter 6
Introduction to Networking
Networking for Home and Small Businesses – Chapter 6
Introducing ACL Operation
6.6 Firewalls Packet Filter (=filtering router)
Firewalls (March 2, 2016) © Abdou Illia – Spring 2016.
Access Control Lists CCNA 2 v3 – Module 11
POOJA Programmer, CSE Department
Firewalls Jiang Long Spring 2002.
Firewalls Chapter 8.
Introduction to Network Security
Networking for Home and Small Businesses – Chapter 6
Computer Networks Protocols
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Chapter 8

 Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common ports/protocols  Configure a firewall  Describe and configure a security appliance  Describe the purpose of a DMZ  Describe an ACL

8.1

 Software or hardware based security system  Allows or denies traffic based on rules  Protects network/devices from unwanted or untrusted traffic

 Hardware  Used to protect network  Dedicated appliance  At edge of network  More $$$  Software  Used to protect a PC  Less $

 Access control list (ACL)  Set of rules to allow a specific type of traffic, blocking all other traffic  Scans incoming & outgoing traffic

 Packet filtering firewall  Circuit level gateway  Application layer firewall

 Basic firewall (most routers)  Operates at layer 3  Inspects packet  Looks at header info & checks against ACL  Allows or rejects based on: Source IP Destination IP Source port Destination port Inbound or outbound  Example: only allow web traffic from a certain subnet

 Filters based on session layer ID  Remember the 3-way handshake?  It checks the incoming packet to see if it’s part of a legitimate communication  DOES NOT INSPECT EACH PACKET  Just looks for Session ID  Faster than packet filtering  Protects against a SYN FLOOD DOS attack

NORMAL ATTACK

 Filters based on the actual application layer data  AKA Proxy Server  Reassembles packets & looks at the data  Example: filter HTTP web request  You request a web page  Web page arrives, reassembles packets for page  Looks at the content Block URL, website categories

 Normally, web page requests come in on port 80  An online gaming application can be re- configured to use port 80  Normally port 80 HTTP is open  A packet inspection will allow port 80  Application layer firewall will block this because it looks at the content, not port  Can also allow/deny based on users/groups

 Filters request from Internet to your internal servers

 Multipurpose device  Less $  Easy to configure  Don’t have same features as a dedicated firewall

 UTM (Unified threat management device)  Combines firewall, anti-spam, anti-virus, VPN, etc.  Allows you to maintain one device  Single point of failure

 What is the most basic type of firewall and how does it work?  Packet filtering; inspects each packet  Which type of firewall looks for a session to ID to see if the communication was initiated by a device in your network?  Circuit level gateway  What hardware device combines a firewall, anti-spyware, ant-virus protection, and VPN services?  UTM

8.1.3

 Logical connections  All the conversations need to be tracked  Port Number in each segment  Helps identify what service the message is for Web request, , DHCP, etc.  Protocols identified by port numbers

 Each message sent, has a source & destination port number  Source Port  Randomly generated & placed into segment  Tracks incoming segment  Destination Port  Used to pass data to proper application at destination

 1-65,535  Well-known ports   Common applications  Registered ports  ,151  Can be source or destination ports  Used for specific applications like IM  Private ports  49,152 & above  For source ports

ProtocolPort #Information FTP 20/21File transfer SSH 22Secure remote login Telnet 23Remote login (TCP only) SMTP 25Used to send between servers DNS 53Domain Name translation DHCP 67/68Assigning IP addresses HTTP 80Connection to transfer web pages POP3 110Transfer of from server to you IMAP 143Transfer of from server to you HTTPS 443Secure connection for web pages transmission RDP 3389Remote Desktop Protocol

 Identify the Protocol & Port # Review Handout

8.1.4

 Control Panel >> System & Security  Block All Incoming- blocks others from coming in  Allow Program/Feature

 TestOut Configuring Windows Firewall  TestOut Configure a Host Firewall Lab  TestOut Practice Questions (14)  TestOut Configure Network Security Appliance Access Lab  TestOut Practice Questions (3)

8.3

 You have servers that need to be accessed from the Internet  You MUST protect the private, inside network  Create an “in-between area”- DMZ

 A list of rules a packet will be evaluated against to determine if it’s allowed through or not  What you can permit or deny, based on direction (in or out):  Specific PC’s  Subnet or network  Specific protocols  Example: You have a web server:  Allow only HTTP traffic on port 80, deny all others

 Placed on firewall or Cisco router  Configure on firewall or router  Assign to proper interface  Packet is checked against list in order, top to bottom  Once a match is made, permit or deny applies  Rest of list is ignored  Implicit deny at end Don’t make a list without permitting something  Standard or Extended ACLs

 Simple ACL 1:  Deny Mike  Deny Dan  Deny Rhiannon  Permit anyone else  Simple ACL 2:  Deny Don  Deny Allie  Deny Lexi  Implicit deny all at end. NO ONE will get in!

 Simple ACL 3:  Deny Mike  Permit anyone  Deny Bryan  Order is important. Once they hit the permit line, anything below means nothing.  Extended ACL 1:  Deny guys from punching Sarah  Deny Allie from sitting down  Permit anyone else to talk to anyone in here  Very specific.

 TestOut Configuring a Perimeter Firewall  TestOut Creating Firewall ACLs  TestOut Configure a DMZ Lab  TestOut Configure a Perimeter Firewall

 Sits before firewall in network  Inspects packets against network rules  Can hold cache of web pages  Can filter content for users (block or flags sites/words in sites)

 TestOut Configuring a Proxy Server  TestOut Practice Questions (15)

 Complete the study guide handout  Complete TestOut  Practice in Packet Tracer  Jeopardy review

Chapter 8