11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11.

Slides:



Advertisements
Similar presentations
IP Addresses: Classful Addressing IP Addresses. CONTENTS INTRODUCTION CLASSFUL ADDRESSING Different Network Classes Subnetting Classless Addressing Supernetting.
Advertisements

FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Chapter 21 Exercises 1. A router forwards packets between networks. (Given a destination host address, it must be able to figure out which network that.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
AVG Internet Security 7.5 Product presentation.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
Security+ Guide to Network Security Fundamentals
Firewall Ercan Sancar & Caner Sahin. Index History of Firewall Why Do You Need A Firewall Working Principle Of Firewalls Can a Firewall Really Protect.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 19: Configuring Windows Firewall
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Firewall Slides by John Rouda
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Optimizing IP Address Allocation
Chapter Twelve Using TCP/IP on the Network. Objectives Here, we’ll examine how to configure TCP/IP. The concepts of subnetting will be examined in detail.
1 Chapter 24 TCP/IP. 2 An Internet According to TCP/IP.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Binary to Decimal Conversion
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Using Windows Firewall and Windows Defender
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Chapter 6: Packet Filtering
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Module 7: Advanced Application and Web Filtering.
Lesson 11: Configuring and Maintaining Network Security
Module 11: Designing Security for Network Perimeters.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
NetTech Solutions Protecting the Computer Lesson 10.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Module 10: Windows Firewall and Caching Fundamentals.
Hour 5 Subnetting 1. you will be able to Explain how subnets and supernets are used Explain the benefits of subnetting Develop a subnet mask that meets.
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
ITMT Windows 7 Configuration Chapter 5 – Connecting to a Network ITMT 1371 – Windows 7 Configuration 1.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Chapter 5 Exploring IPv4.
Managing Windows Security
Securing the Network Perimeter with ISA 2004
Chapter 9 Objectives Understand TCP/IP Protocol.
Information Security Session October 24, 2005
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Securing Windows 7 Lesson 10.
AbbottLink™ - IP Address Overview
Presentation transcript:

11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY2 OVERVIEW  Understand IP addressing  Manage IP subnetting and subnet masks  Understand IP security terminology  Manage Internet security features of Windows XP  Configure and troubleshoot Windows Firewall  Understand IP addressing  Manage IP subnetting and subnet masks  Understand IP security terminology  Manage Internet security features of Windows XP  Configure and troubleshoot Windows Firewall

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY3 UNDERSTANDING BINARY NUMBERS

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY4 CONVERTING DECIMAL ADDRESSES TO BINARY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY5 CONVERTING BINARY ADDRESSES TO DECIMAL

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY6 USING CALCULATOR TO CONVERT NUMBERS

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY7 SUBNET MASKS

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY8 PROBLEMS WITH CLASSFUL ADDRESSES  Wasted addresses  Shortage of address blocks  Excessive routing table entries  Wasted addresses  Shortage of address blocks  Excessive routing table entries

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY9 SUBNETTING A LARGE NETWORK

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY10 CLASSLESS INTERDOMAIN ROUTING (CIDR)

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY11 SUPERNETS

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY12 SECURING IP COMMUNICATIONS  Internet threats  Protective technologies  Configuring and managing Windows Firewall  Monitoring Internet communications security  Internet threats  Protective technologies  Configuring and managing Windows Firewall  Monitoring Internet communications security

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY13 INTERNET THREATS  Viruses (the oldest threat)  Worms (the most persistent threat)  Trojan horses  Spyware  Zombies  Direct hacking  Viruses (the oldest threat)  Worms (the most persistent threat)  Trojan horses  Spyware  Zombies  Direct hacking

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY14 VIRUSES  Take advantage of gullible users  Infect document, graphics, and executable files  Often include mass-mailing components  Can carry destructive payloads  Take advantage of gullible users  Infect document, graphics, and executable files  Often include mass-mailing components  Can carry destructive payloads

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY15 WORMS  Self-replicating  Network-aware  Use bugs in programs or systems to spread  Can carry viruses or other payloads  Self-replicating  Network-aware  Use bugs in programs or systems to spread  Can carry viruses or other payloads

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY16 TROJAN HORSES  Usually ed or downloaded  Appear to be a useful program or game  Carry payload or back door application  Usually ed or downloaded  Appear to be a useful program or game  Carry payload or back door application

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY17 SPYWARE  Has attributes of Trojan horses or worms  Spies on its victim  Might transmit marketing data or transmit personal data to the spyware author  Has attributes of Trojan horses or worms  Spies on its victim  Might transmit marketing data or transmit personal data to the spyware author

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY18 ZOMBIES  Payload of worm or Trojan horse  Remotely controlled to attack network targets  Participate in large-scale assaults on public Web sites  Payload of worm or Trojan horse  Remotely controlled to attack network targets  Participate in large-scale assaults on public Web sites

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY19 DIRECT HACKING  Relatively low incidence  Hardest form of attack to defeat  Relatively low incidence  Hardest form of attack to defeat

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY20 PROTECTIVE TECHNOLOGIES  Security Center  Windows Firewall  Internet Connection Sharing (ICS)  Third-party utilities  Security Center  Windows Firewall  Internet Connection Sharing (ICS)  Third-party utilities

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY21 SECURITY CENTER

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY22 FIREWALL TERMINOLOGY  Packet filtering  Stateful packet filtering  Exceptions (packet filter rules)  Allowed traffic  Rejected traffic  Logging  Packet filtering  Stateful packet filtering  Exceptions (packet filter rules)  Allowed traffic  Rejected traffic  Logging

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY23 ENABLING WINDOWS FIREWALL

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY24 FIREWALL EXCEPTIONS

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY25 ADVANCED WINDOWS FIREWALL SETTINGS

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY26 MONITORING INTERNET SECURITY  Windows Firewall monitoring  Service logs  Event logs  Windows Firewall monitoring  Service logs  Event logs

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY27 WINDOWS FIREWALL ALERTS

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY28 WINDOWS FIREWALL LOGS

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY29 SERVER LOGS

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY30 SUMMARY  IP addresses are 32-bit binary addresses.  The network portion of IP addresses determines location.  CIDR allows creation of custom netblocks.  CIDR permits use of variable-length subnet masks.  Windows Firewall blocks unauthorized packets.  Windows Firewall exceptions allow specified traffic to pass through the firewall.  Alerts and logs warn of attempted attacks.  IP addresses are 32-bit binary addresses.  The network portion of IP addresses determines location.  CIDR allows creation of custom netblocks.  CIDR permits use of variable-length subnet masks.  Windows Firewall blocks unauthorized packets.  Windows Firewall exceptions allow specified traffic to pass through the firewall.  Alerts and logs warn of attempted attacks.