Homework 02 Announce: 20090408 Due: 20090420. Requirements Basic firewall settings (40%) Set trusted network 140.113.235.0/24 Allow all connections from.

Slides:



Advertisements
Similar presentations
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Advertisements

Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
DMZ (De-Militarized Zone)
Final Presentation Topics 1) Firewalls 1) Firewalls 2) Virtual Private Networks 2) Virtual Private Networks 3) Secure Socket Layer 3) Secure Socket Layer.
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
Chapter 7 Firewalls. Firewall Definition  A network device that enforces network access control based upon a defined security policy.
1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level &
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
Circuit & Application Level Gateways CS-431 Dick Steflik.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Network Security With nmap By *** *****. Installing nmap netlab-2# cd /usr/ports/security/nmap netlab-2# make install all.
1 Enabling Secure Internet Access with ISA Server.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Course 201 – Administration, Content Inspection and SSL VPN
1 Figure 5-4: Drivers of Performance Requirements: Traffic Volume and Complexity of Filtering Performance Requirements Traffic Volume (Packets per Second)
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Chapter 6: Packet Filtering
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
System Administration and Maintenance. Proxy Server 1 Purpose – – To separate internal network from internet (NAT) To cache often used content User control:
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Proxy Servers.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Homework 02 NAT 、 DHCP 、 Firewall 、 Proxy. Computer Center, CS, NCTU 2 Basic Knowledge  DHCP Dynamically assigning IPs to clients  NAT Translating addresses.
Lab 11 Overview Windows Server Last Labs Lab 12  Cisco Firewall.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Firewalls and proxies Unit objectives
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Module 10: Windows Firewall and Caching Fundamentals.
NAT & PAT Network Address Translation Port Address Translation.
Firewall Technology and InterCell Communication Peter T. Dinsmore Trusted Information Systems Network Associates Inc 3060 Washington Rd (Rt. 97) Glenwood,
TERENA Networking Conference, 2003©The JNT Association, 2003 Designing Manageable Protocols Andrew Cormack Chief Security Adviser UKERNA.
© 2006 Intertex Data AB 1 Connect your LAN to the SIP world, while keeping your existing firewall*! The IX67 LAN SIParator (Part of the SIP Switch option.
Serial Server Configuration Peter Szyszko. Hardware Configuration  Unit has to be connected to network and powered.  Computer has to be connected to.
PROXY. SQUID Squid is a fully-featured HTTP/1.0 proxy which is almost (but not quite -- we're getting there!) HTTP/1.1 compliant. Squid offers a rich.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Kittiphan Techakittiroj (25/06/59 19:10 น. 25/06/59 19:10 น. 25/06/59 19:10 น.) Network Address Translation Kittiphan Techakittiroj
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
NAT、DHCP、Firewall、FTP、Proxy
Installing TMG & Choosing a Client Type
Lecture 5 Blocking practices
Affinity Depending on the application and client requirements of your Network Load Balancing cluster, you can be required to select an Affinity setting.
CONNECTING TO THE INTERNET
Backdoor Attacks.
Firewalls.
Two FTP connections from different hosts
Em4 Ethernet tutorial Remote connection.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Firewalls Purpose of a Firewall Characteristic of a firewall
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Firewalls By conventional definition, a firewall is a partition made
UCAS Reports 2007 From school and home.
46 to 1500 bytes TYPE CODE CHECKSUM IDENTIFIER SEQUENCE NUMBER OPTIONAL DATA ICMP Echo message.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Homework 02 Announce: Due:

Requirements Basic firewall settings (40%) Set trusted network /24 Allow all connections from these hosts Deny connections from /24 Log connections from these hosts Deny ssh bruteforce attack max-src-conn-rate Set up a FTP server inside jail (30%) Set a private address for jail Set NAT for your jail Install a FTP server in the jail Provide service on your public IP, port 21 Client can connect your FTP Setup a proxy with authentication (30%) rdr on em0 proto tcp from ! to any port > port 80 2

Jail Jail -- imprison process and its descendants jail(8) jail_enable="YES“ jail_list="jail0 jail1 jail2 jail3 jail5“ # jail0 jail_jail0_rootdir="/usr/local/jails/jail0“ jail_jail0_hostname="jail0.lwhsu.csie.net“ jail_jail0_ip=" “ jail_jail0_interface="lo0“ jail_jail0_devfs_enable="YES“ jail_jail0_devfs_ruleset="devfsrules_jail“ jail_jail0_procfs_enable="YES“ jail_jail0_mount_enable="YES" 3

Proxy with authentication Install a proxy server www/privoxy www/squid Install a web server & design autnentication procedure Create a simple authentication web page Redirect all un-authenticated client to authentication page Reference: proxy.cs.nctu.edu.tw 4