Firewalls Routers, Switches, Hubs VPNs

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

Module 5: Configuring Access for Remote Clients and Networks.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Firewall Configuration Strategies
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Presented by Serge Kpan LTEC Network Systems Administration 1.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
A Guide to major network components
Computer Networking Devices Seven Different Networking Components.
Networking Components
Networking Components Chad Benedict – LTEC
DrayTek VPN Solution. Outline What is VPN What does VPN Do Supported VPN Protocol How Many Tunnels does Vigor Support VPN Application Special VPN Application.
Basic Networking Components
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Networking Components Christopher Biles LTEC Assignment 3.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Components: Assignment Three
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Common Devices Used In Computer Networks
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
SHAWN CROWE LTEC /026 ASSIGNMENT #3 Networking Components.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Security fundamentals Topic 10 Securing the network perimeter.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Network Equipment Assignment 3 LTEC 4550 Aaron Whitaker.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
ASSIGNMENT 3 - NETWORKING COMPONENTS BY JONATHAN MESA.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Assignment 3 Jacob Seiz. Hub A hub provides a central access point for a network. Through multiple I/O ports a hub can connect multiple Ethernet devices.
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Security fundamentals
Chapter Objectives In this chapter, you will learn:
Networking Devices.
Connecting LANs, Backbone Networks
Computer Networking Devices
Planning and Troubleshooting Routing and Switching
Click to edit Master subtitle style
Introduction to Networking
Introducing To Networking
Connecting Networks Repeater: physical layer Bridge: data link layer
Virtual LANs.
Networks.
6.6 Firewalls Packet Filter (=filtering router)
I. Basic Network Concepts
Virtual Private Network
VPN What, where, who, why when?.
VPN: Virtual Private Network
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
AbbottLink™ - IP Address Overview
Introduction to Network Security
Presentation transcript:

Firewalls Routers, Switches, Hubs VPNs

Firewalls Implemented Hardware Software Combination of (Hardware and Software) Types Host-based (Personal) Network

Things we can do with firewalls All data traffic from outside is separated from inside the firewall We could allow only traffic coming to port 80 to be allowed. We could allow all traffic except traffic to port 80 to be allowed. No ftp traffic allowed (unencrypted passwords)

Network firewall Use a firewall device (usually a computer running firewall software) Install 2 interfaces. 1) connected to our internal network interface 2) connected to the external network or internet All data going to and from the internet travels though the firewall following rules that decide if traffic can or can not go though Places at the boundary of the trusted network

Host based (Personal) Firewall Software installed on one host (computer) that checks all traffic to-and-from that system.

Layers of firewalls Several firewalls can be used that prohibit traffic from passing though. This makes it more difficult for hackers to get though. Most operating systems come with host based firewalls and right there if you have a network based fire wall and use an OS with firewalls, you have 2 layers of firewalls.

Firewalls read IP packets Network layer data such as IP address and Port Numbers of the source and destination are read and checked against internal tables. Host based firewalls are usually application firewalls. Network based firewalls are usually Packet Filters.

Policies for traffic going through Allow Policy – all packets that do not meet the “allow criteria” are blocked. block everything and open holes Deny Policy - all packets that meet the “deny criteria” are blocked. block nothing and close holes

Detections of a possible intrusion

DNS (Domain Name System) A system that maps IP addresses to URL names www.facebook.com = 31.13.80.36 www.amazon.com = 13.33.60.247 If you firewall blocks www.facebook.com and you can get to a different ip address to a different facebook server, you can get in directly using the unblocked IP address.

Hubs, Switches, and Routers Hubs – connect a few computers together. All messages sent out of one computer is broadcasted (spamed) to all computer connected to the hub. Switch – can be used to join switched LANs Router – connects at least 2 networks Bridge – connects two networks (LANs) to create 1 network.

Routers, Switched, Hubs and OSI

VPN (Virtual Private Network)

VPN (Virtual Private Network) A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. VPNs may allow employees to securely access a corporate intranet while located outside the office A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption

VPN pros and cons Pros: VPNs can bypass some firewall content restrictions and censorship. Cons: Speed is slowed down: New link to communication path. You  VPN  Destination Encryption / decryption algorithms You compete with other users of the VPN server. VPN cost about $60/year (Free ones are very slow)