Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

®® Microsoft Windows 7 Windows Tutorial 8 Connecting to Networks with Mobile Computing.
XP Tutorial 4 New Perspectives on Microsoft Windows XP 1 Microsoft Windows XP Personalizing Your Windows Environment Tutorial 4.
SYSTEM ADMINISTRATION Chapter 19
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
NetAcumen ActiveX Download Instructions
Microsoft Windows Vista Chapter 6 Customizing Your Computer Using the Control Panel.
10.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
XP New Perspectives on Microsoft Office Excel 2003, Second Edition- Tutorial 11 1 Microsoft Office Excel 2003 Tutorial 11 – Importing Data Into Excel.
XP 1 Using Common Features of Microsoft Office 2003 Rod Rodrigues.
DHP-306AV & DHP-W306AV. Agenda: How to change Encryption on a DHP-306AV How to change the Device Password on a DHP-306AV What will happen if the Device.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
XP 1 New Perspectives on Microsoft Windows XP, 2005 Service Pack 2 Update Appendix D Microsoft Windows XP, Service Pack 2 Update Appendix D – Setting Up.
File sharing. Connect the two win 7 systems with LAN card Open the network.
®® Microsoft Windows 7 Windows Tutorial 10 Improving Your Computer’s Performance.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
TAX-AIDE Network Router Setup Network Printer Setups July SMT/TCS Training - Dallas1.
Welcome To. Improving Remote File Transfer Speeds By The Solution For: %
Internet Setup in Microsoft Windows Windows Layering Bindings Adding Adapters, Protocols, and Clients TCP/IP Configuration.
Guide to MCSE , Second Edition, Enhanced 1 Objectives Understand and use the Control Panel applets Describe the versatility of the Microsoft Management.
Working with Drivers and Printers Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Understanding Drivers and Devices Install and configure.
NORTEL NETWORKS CONFIDENTIAL CallPilot 150 Modem Access Jan 03, 2005 Version 1.5.
Leading at Every Turn. 1)Make sure you have your Trusted Sites configured properly in Internet Explorer 2)Store your credentials on your PC so you.
Windows XP 101: Using Windows XP Professional in the Classroom.
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. M I C R O S O F T ® Preparing for Electronic Distribution Lesson 14.
Microsoft Office 2007 Access 2007 Chapter 9 Administering a Database System.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Hands-on Networking Fundamentals
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Using Windows Firewall and Windows Defender
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
© 2009 FP Mailing Solutions. All rights reserved. Customer Service Training Basic Computer Training.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
CHAPTER 9 Introducing Microsoft Office Learning Objectives Start Office programs and explore common elements Use the Ribbon Work with files Use.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Information Security 493. Lab 11.3: Encrypt a Windows File Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow.
Tutorial #1. Lab#: 1 Securing your system Lab 1.2: Tenable Nessus Nessus currently works on Windows, Linux, and Mac. It is a vulnerability scanner, which.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
Connecting to a Network Lesson 5. Objectives Understand the OSI Reference Model and its relationship to Windows 7 networking Install and configure networking.
1. Chapter 25 Protecting and Preparing Documents.
XP New Perspectives on Windows XP Tutorial 1 Exploring the Basics.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
OCC Network Drives  H:\  P:\ 
Chapter 1 Creating a Dreamweaver Web Page and Local Site
Stuff By Zach and Turtle To designate a default printer, choose Start > Control Panel > Printers and Faxes. Right-click the printer, and then.
Microsoft Access 2010 Chapter 10 Administering a Database System.
1 Part-1 Chap 5 Configuring Accounts Definitions.
CMPF124: Basics Skills for Knowledge Workers Manipulating Windows GUI.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
XP New Perspectives on Microsoft Office FrontPage 2003 Tutorial 7 1 Microsoft Office FrontPage 2003 Tutorial 8 – Integrating a Database with a FrontPage.
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
A guide to file sharing on Windows XP Peer to Peer File Sharing.
ERICSON BRANDON M. BASCUG Alternate - REGIONAL NETWORK ADMINISTRATOR HOW TO TROUBLESHOOT TCP/IP CONNECTIVITY.
XP New Perspectives on Microsoft Windows XP Tutorial 2 1 Microsoft Windows XP Working with Files Tutorial 2.
How to fix Error code 0x80072ee2 in Windows 8.1? Fix%20%20Update%20Error%200x80072EE2%20in%20Windows%20 8.1,%20Windows%2010!%20-%20Fix%20PC%20Errors.htm.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Pasewark & Pasewark 1 Windows Vista Lesson 1 Windows Vista Basics Microsoft Office 2007: Introductory.
Windows Tutorial 5 Protecting Your Computer
Local Network and Internet Access Network
Microsoft Windows XP Inside Out Second Edition
Welcome! IE 7 Test Drive Presented by the Office of Information Technology.
Windows xp PART 1 DR.WAFAA SHRIEF.
Microsoft Windows 7 Basics
Presentation transcript:

Information Security 493

Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a router or a networked computer.router computer A routing table utilizes the same idea as one would when using a map in package delivery. Whenever a node needs to send data to another node on a network, it needs to know where to send it. node

Routing table & firewalls Whenever a device cannot directly connect to the destination node, it needs to find another way to send the package. Whenever a node does not know how to send the package it sends an IP packet to a gateway in the LAN.IPgatewayLAN

Routing table & firewalls The routing table consists of at least three information fields:- The network id: i.e. the destination network id. Metric (cost): i.e. the cost or metric of the path through which the packet is to be sent. next hop(gateway): The next hop, or gateway, is the address of the next station to which the packet is to be sent on the way to its final destination

Lab 4.1: Examine the Windows Routing Table Routing tables identify the network destination, netmask, gateway, and interface to use as well as the metric associated with it. For this lab, you’ll look for the presence of a routing table on a Windows-based host (XP or 2000/2003): 1. Open a command prompt by choosing Start  Run and enter CMD at the Run prompt. 2. Enter the command route print. 3. If any routing tables exist, active routes are displayed. Carefully look at the display and notice how data is routed between this network and others.

Conti… 4. In some versions of Windows, the display breaks out the active routes and persistent routes. Persistent routes survive a reboot and are always configured. You can make a route persistent by creating it with the –p parameter. 5. Enter the command route. Read the help message displayed, and examine the different parameters available for setting and removing routes.

Firewalls A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. A firewall's basic task is to regulate some of the flow of traffic between computer networks of different trust levels. Typical examples are the Internet which is a zone with no trust and an internal network which is a zone of higher trust.computer networksInternetinternal network

Conti… A zone with an intermediate trust level, situated between the Internet and a trusted internal network, is often referred to as a "perimeter network" or Demilitarized zone (DMZ). Demilitarized zone In this lab you will be learning how to turn the firewall on and off on both systems Windows. You will also learn how to view the routing tables of the system and learn how to change entrees in routing table.

Lab 4.2: Turn on the Firewall in Windows XP To turn on the firewall, follow these steps: 1. Right-click the network connection icon in the notification area at the right of the Taskbar. 2. Choose ‘Open network connections’. 3. On the left side of the dialog box, click Change Windows firewall settings. 4. The dialog box that appears is shown in Figure Click the On button to enable the firewall, then choose the Exceptions tab and configure any exceptions that you want to allow. 6. Click OK to exit this dialog box and OK to exit the earlier dialog boxes.

2 nd Method: To turn on the firewall, follow these steps: 1. Choose Start  Control Panel  Security Center. The dialog box shown in Figure 4.2 appears. Instead of choosing Security Center in Control Panel, you could choose Windows Firewall and immediately access the Firewall Configuration dialog box. The advantage of choosing Security Center is that you see the other options that are also available. 2. Toggle the setting for the firewall from Off to On. 3. Exit the Security Center. 4. Exit Control Panel. Note that from this location, you can toggle the status of the firewall. If the firewall is already turned on, you can follow these same steps to turn it off should you need to.

Network Security Lab !

Lab 4.3: Work with Performance Monitor and Windows. Performance Monitor’s objects and counters are specific; you can use Performance Monitor as a general troubleshooting tool as well as a security-troubleshooting tool. For instance, you can see where resources are being utilized and where the activity is coming from. In this lab, you’ll use the Performance Monitor tool to become more familiar with its functionality:

Conti… 1. Select Start  Run  PERFMON. 2. Click the Add Counters button, and choose to add the Processor Performance object. 3. Add the %Processor Time counter, and then click Close. 4. Choose Start  Search  For Files and Folders and click the Search Now button with- out specifying any particular files to look for. Quickly change to Performance Monitor and watch the impact of this search on the processor. This action is time consuming and therefore will help you notice the changes that take place in Performance Monitor.

Conti… 5. Run the same operation again, but this time change your view within Performance Monitor to histogram (click the two buttons to the left of the plus sign [+]). 6. Run the same operation again, and change your view within Performance Monitor to report (click the button directly to the left of the plus sign [+]). 7. Exit Performance Monitor.

Make File Extensions Visible in Windows XP By default, the extensions for known file types do not appear in many Windows-based operating systems, such as Windows XP. Knowing what the extension is, however, can help you readily identify what type of file it is—executable, document, and so on. To make file extensions visible, follow these steps: 1.

Conti… 1. Click Start  Control Panel  Folder Options. 2. Choose the View tab. 3. Choose the Show Hidden Files and Folders radio button. 4. Deselect the Hide Extensions for Known File Types check box. 5. Click OK and exit from Control Panel. You’ll now be able to see the extensions on file names

Change to WPA Security in Windows XP To change the wireless connection to Wi-Fi Protected Access (WPA) from any other security setting, follow these steps: 1. Right-click the wireless connection icon in the notification area at the right of the Taskbar. 2. Choose View Available Wireless Networks. 3. On the left side of the dialog box, click Change Order of Preferred Networks.

Conti… 4. Select the Wireless Networks tab and click on the network you want to change beneath the Preferred Networks section. When it is highlighted, click Properties. 5. On the Association tab, choose either WPA or WPA- PSK (the latter incorporates Pre Shared Key and is recommended if you don’t have a central authentication server) for Network Authentication.

Lab 9.3: View Internet Explorer Security Settings A great many security threats come through the Internet, and the browser is the interface most commonly used to reach the Internet, making the security settings for the browser critically important. To view the security settings for Internet Explorer, follow these steps:

Conti… 1.Within Internet Explorer, click Tools  Internet Options. 2. Choose the Security tab. 3. Chose the Internet icon, and then click the Custom level button. 4. Choose to enable or disable any settings, then click OK to exit. 5. Click OK to exit the Internet Options dialog box.

Configure the Phishing Filter + Pop-up filter The checking component of the phishing filter in Internet Explorer can be turned on or off, or the entire filter can be disabled. To turn on automatic website checking, follow these steps: 1.

Conti… 1.Within Internet Explorer, click Tools  Internet Options and choose the advanced tab. 2. Scroll down beneath Settings to Phishing Filter. 3. Click Turn On Automatic Website Checking. And Click Apply.

Conti… 4. A message appears telling you that website addresses will be sent to Microsoft and checked against a database of reported phishing websites. Click OK. 5. Click on the Privacy tap. 6. Check the box that says “turn on Pop-up blocker”, and click OK. 7. Exit the Internet Options.

Thanks !