Digital Pacman: Firewall Edition Group Members Julia Coco Adam Daunis Dakota Greene Greg Huete ISDS 4120 11/26/2012
Digital Pacman: Firewall Edition Initiate startup… DONE Firewall definitions… IN PROGRESS Protection methods… IN PROGRESS Filtering Logic… IN PROGRESS Personal Firewalls… IN PROGRESS Network Zones… IN PROGRESS Remote Access… IN PROGRESS
Digital Pacman: Firewall Edition Loading firewall definitions… IN PROGRESS Network Threats… IN PROGRESS Firewall self-actualization… IN PROGRESS Protection Methods Sequence… LOADING… DONE DONE DONE Firewall Options Does not have to be dedicated device Run in two locations Hide IP Addresses Using NAT Filter Traffic Based on MAC Addresses Hackers Natural Disasters Firewalls protect networks from external threats by filtering packets, using many different techniques 1. External Router usually acts as firewall AKA “Network-based” or “hardware” firewalls Selectively block TCP/UDP Ports 2. Internal Computer software AKA “Host-based” or “software” firewalls Anything that can potentially damage network data, machines, or users 1 Users with Good Intentions
DONE DONE DONE DONE Protection method: Hide IP… IN PROGRESS Network Address Translation… IN PROGRESS Load NAT Notes… IN PROGRESS Load NAT Graphic… IN PROGRESS DONE DONE DONE DONE Most common firewall technique Hackers can probe exposed IP addresses for vulnerabilities Hiding IPs prevents these probes Network Address Translation (NAT) Translates system IP before sending via network Network using NAT assigns system private IP address Reduces Need for IANA public IP addresses Built into most routers Not originally designed as firewall Network IP Addresses NAT
Second most common firewall tool Less common tool used by Hackers Protection method: Port Filtering… IN PROGRESS Selectively blocking TCP/UDP ports IN PROGRESS Load Port Filter Notes… IN PROGRESS Load Port Filter Graphics… IN PROGRESS DONE DONE DONE DONE Second most common firewall tool Less common tool used by Hackers Restricts packets based on port numbers Prevents the passage of any TCP or UDP segments Requires serious configuration “Which ports do I allow in?” Two Ways: Have the port filtering close all ports Leave all the ports open Dynamic port usage Routers can have both NAT and port filtering TCP Ports Dynamic Port Usage UDP Ports
DONE DONE DONE DONE Protection method: Filter Traffic Based on MAC Addresses… IN PROGRESS Initiate MAC Filtering… IN PROGRESS Load MAC Filtering Notes… IN PROGRESS Load MAC Filtering Graphic… IN PROGRESS DONE DONE DONE DONE Guest Laptop Allow or deny access to the network according to the MAC address of the client Similar to packet filtering Usually used as a security measure for a wireless network Advantage: Easy to set up Disadvantages: Can be defeated through MAC spoofing It can be a little work to add a new MAC address every time someone new wants to use your Wi-Fi Wireless Network
Personal Firewalls > Single machines or small network > Default block incoming packets > Windows Firewall
Connections Dial Up High Speed > Difficult for hackers to detect Connections are temporary DHCP assigned IP addresses > Just need antivirus system High Speed > Always connected > DHCP with long-lived IP addresses Attackers have time Antivirus and firewall recommended
Large Networks Web and Email Require heavy protection Dedicated firewall boxes Filter traffic and provide innovative features Honeypot concept Exposed Demilitarized zone Hacker ! Threat detected Ban Intruder ? No useful information found
Securing Remote Access Employees access network from home Cost effective Balancing act Security challenge Virtual Private Networks Vulnerability Scanners
Digital Pacman: Firewall Edition Firewall definitions… IN PROGRESS Protection methods… IN PROGRESS Filtering Logic… IN PROGRESS Personal Firewalls… IN PROGRESS Network Zones… IN PROGRESS Remote Access… IN PROGRESS DONE DONE DONE DONE DONE DONE
Questions?