March 2005 1R. Smith - University of St Thomas - Minnesota CISC 210 - Class Today Homework RemindersHomework Reminders RecapRecap FirewallsFirewalls Firewall.

Slides:



Advertisements
Similar presentations
Visit us at Introduction to Computer Networks.
Advertisements

CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
©2012 ClearOne Communications. Confidential and proprietary. COLLABORATE ® Video Conferencing Networking Basics.
IP Masquerading Homes and Businesses: When you only have one IP but you have LOTS of machines.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
March R. Smith - University of St Thomas - Minnesota QMCS Class Today Attack ExerciseAttack Exercise Attacking serversAttacking servers Firewalls.
6/22/2015 1R. Smith - University of St Thomas - Minnesota QMCS Class Today St. Lukes Case StudySt. Lukes Case Study.
March R. Smith - University of St Thomas - Minnesota QMCS Class Today Working the InternetWorking the Internet RoutingRouting Firewalling in.
Subnetting.
March R. Smith - University of St Thomas - Minnesota QMCS Class Today Homework due TodayHomework due Today LAN and Internet AddressesLAN and.
hotEx RADIUS Manager Installation
Fundamentals of Networking Discovery 1, Chapter 5 Network Addressing.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
Andrew Smith 1 NAT and DHCP ( Network Address Translation and Dynamic Host Configuration Protocol )
Networking Components Chad Benedict – LTEC
NetComm Wireless Transparent Bridge Mode Feature Spotlight.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Advanced Networking for DVRs
TOSIBOX LOCK security options 1 1.
Network Addressing Networking for Home & Small Business.
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Addressing Networking for Home and Small Businesses – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Addressing Networking for Home and Small Businesses – Chapter.
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
Day15 IP Space/Setup. IP Suite of protocols –TCP –UDP –ICMP –GRE… Gives us many benefits –Routing of packets over internet –Fragmentation/Reassembly of.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Network Address Translation (NAT)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Addressing Networking for Home and Small Businesses – Chapter 5.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Home Networking. Objectives Understand the basics Network Addressing Learn the basic hardware needed to form a home network Learn basic Firewall functionality.
9/11/2015Home Networking1 Bob.test Have Road Runner Unhappy about reports of constant probes of machines Policy decision –I want to prevent unauthorized.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Lab How to Use WANem Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
BASIC CONFIGURATION MODEM D-LINK
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
Functional Area 3: ProPortable Module 3.4 ProPortable Router GUI.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
CIS 3360: Internet: Network Layer Introduction Cliff Zou Spring 2012.
© 2007 Cisco Systems, Inc. All rights reserved. 1 Network Addressing Networking for Home and Small Businesses – Chapter 5 Darren Shaver – Modified Fall.
Network Addressing Networking for Home & Small Business.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
March R. Smith - University of St Thomas - Minnesota CISC Class Today Homework RemindersHomework Reminders RecapRecap Finish up Public Key.
Network Addresses, Switches and Routing Bob Bradley IS361 Fall 2005 Chapter 1 Part 2.
10/27/2015 1R. Smith - University of St Thomas - Minnesota CISC Class Today Structured WiringStructured Wiring A wiring closetA wiring closet Ethernet.
HotEx Radius Manager Installation. hotEx RADIUS Manager Network Diagram.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
CISCO PACKET TRACER By:- Ankita Rawat Sohit Mehta Sukhwinder Singh.
March R. Smith - University of St Thomas - Minnesota CISC Class Today HomeworkHomework Project ScheduleProject Schedule LabLab RecapRecap Protecting.
NETGEAR CONFIDENTIAL FVS338 ProSafe VPN Firewall 50.
Panasonic UC Pro - UC Pro Web Service Basic setup -
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Remote Access Using a Netgear DG834 Router 1http://
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
TECH TIP – Videoconferencing settings for Apple AirPort Extreme wireless access point. SYMPTOM / ISSUE After connecting a set-top videoconferencing system.
Networking for Home and Small Businesses – Chapter 5
Classful Subnetting IPv4
Chapter 05 Exam Review CCNA Discovery 01 – Computer and Network Fundamentals Presented by: Phillip Place Cisco Academy Instructor Lake Michigan College.
Instructor Materials Chapter 4: Network Addressing
Configuring DHCP Relay Configuration Example
Networking for Home and Small Businesses – Chapter 5
Introducing To Networking
Networking for Home and Small Businesses – Chapter 5
NAT Configuration For ZyXEL ADSL Wireless Router
AbbottLink™ - IP Address Overview
Presentation transcript:

March R. Smith - University of St Thomas - Minnesota CISC Class Today Homework RemindersHomework Reminders RecapRecap FirewallsFirewalls Firewall LabFirewall Lab

Homework Graded LabLab –Most people did fine – if you forgot something, that was a problem Diagrams: my expectationsDiagrams: my expectations –Show the relevant layers Gateways and Routers all have a Network LayerGateways and Routers all have a Network Layer I prefer to see the physical layer, too.I prefer to see the physical layer, too. –#4 – only 3 boxes were really required I didn’t mind if you added a routerI didn’t mind if you added a router –Style question: what order do layers belong in? I prefer to have physical at bottomI prefer to have physical at bottom Split the lower level to show bifurcated layersSplit the lower level to show bifurcated layers March R. Smith - University of St Thomas - Minnesota

March R. Smith - University of St Thomas - Minnesota Recap: Firewalls ObjectivesObjectives Types of firewall traffic controlTypes of firewall traffic control Firewall FilteringFirewall Filtering Network Address TranslationNetwork Address Translation The LabThe Lab

March R. Smith - University of St Thomas - Minnesota Recap: Network Address Translation Original purpose: more hosts & addressesOriginal purpose: more hosts & addresses –Let “insiders” use restricted addresses –Translate them on the way out A ‘multiplexing’ mechanismA ‘multiplexing’ mechanism –Users share a “real” Internet address

Linksys Home Page Type in the router’s IP addressType in the router’s IP address –or PasswordPassword –Replace ‘1’ with ‘2’ in the admin password –or “admin” March R. Smith - University of St Thomas - Minnesota

Five major headings of controls SetupSetup –Establishes the local address and configuration SecuritySecurity –Filters traffic, enables/disables certain types of traffic Applications and GamingApplications and Gaming –Allows connections to servers on the LAN from the Internet AdministrationAdministration –Change password, enable remote management features StatusStatus –Check the status of the WAN connection –Check status of LAN and its attached hosts March R. Smith - University of St Thomas - Minnesota

Address Setup Set to “Obtain IP Automatically”Set to “Obtain IP Automatically” Our local default internal addresses are Net 10Our local default internal addresses are Net 10 March R. Smith - University of St Thomas - Minnesota

Address Settings Set local address to Set local address to –That’s the address of this router –Subnet mask Enable Local DHCP serviceEnable Local DHCP service –Start assigning local addresses at 100, total of 50 addresses –Renews address “leases” daily March R. Smith - University of St Thomas - Minnesota

Looking at the Router Status Internal and external routing dataInternal and external routing data –The “Internet” addresses are for the “outside” of the router March R. Smith - University of St Thomas - Minnesota

Looking at the LAN Status Gives addressing information about the router as seen from the LAN sideGives addressing information about the router as seen from the LAN side –Click the button to see the DHCP client table March R. Smith - University of St Thomas - Minnesota

DHCP Client Table Lists all active clients on the LAN Provides a map to the LAN Just like the lab March R. Smith - University of St Thomas - Minnesota

The Management Screen Starting point for lower level controls Actually, password changing is all this is good for PLEASE DON’T CHANGE THE PASSWORD. March R. Smith - University of St Thomas - Minnesota

Traffic Filtering Blocks LAN machines from the InternetBlocks LAN machines from the Internet –Block by IP address –Block by MAC address Block Port NumbersBlock Port Numbers Other filtersOther filters –Multicast –External Internet queries mostly Pingsmostly Pings March R. Smith - University of St Thomas - Minnesota

Port Forwarding Allows inbound connections – forwards particular ports to specific PCs on the LANAllows inbound connections – forwards particular ports to specific PCs on the LAN Under the “Applications and Gaming” tab.Under the “Applications and Gaming” tab. March R. Smith - University of St Thomas - Minnesota

Firewall Lab OverviewOverview –Rewire the lab to use the firewall –Map the rewired lab –Demonstrate host blocking through the firewall –Demonstrate NAT through the firewall March R. Smith - University of St Thomas - Minnesota

March R. Smith - University of St Thomas - Minnesota That’s it Questions?Questions? Creative Commons License This work is licensed under the Creative Commons Attribution-Share Alike 3.0 United States License. To view a copy of this license, visit or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.