Download presentation
Presentation is loading. Please wait.
Published byAmanda O’Brien’ Modified over 8 years ago
1
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a private network from the Internet Separate areas within a private network
2
Methods of Protection Packet filtering firewalls ( most common) Circuit-level firewalls Application-gateway firewalls
3
Packet – filtering Examines every packet Makes a decision Operates @ data link and network layers
4
How It Works IP address – allow/deny based on source/destination address
5
Port Number Port 80 – open Port 21 – closed (FTP) 23 – closed (Telnet) Port 25 – open (SMTP) 110 – open (POP3) Protocol id – each IP packet has a protocol ID
6
Circuit-level firewalls Operate @ transport layer Sends all requests from the firewall’s IP address (NAT) hides the internal network
7
Application Gateway Firewalls Most functional Set rules Authentication Which systems are accessible
8
DMZs – demilitarized zones Separate network of servers only accessible through the firewall – to inside and outside traffic.
9
Proxy Servers Proxy server – intermediary between user on internal network and service on external network (Internet). Takes request from user Performs the request Provides NAT function Hides internal addresses Controls Internet access Filter requests Allow Disallow Check retrieved material Acceptable Unacceptable HTTP80 POP3110 SMTP25 HTTPS443
10
Caching Storing files on the server’s hard drive Provides access more quickly Reduces traffic on Internet connection
11
Caching Considerations Hard drive capacity Old versions of pages Aging (remove page after certain period) Check for newer version
12
ICP – Internet Cache Protocol Lightweight message format used for communicating among web caches. Used to exchange “hints” about the existence of URLs in neighbor caches.
13
CARP – Caching Array Protocol Proxy server proxy server client Multiple proxy servers in one network Clients must be configured through browser settings for a proxy server. Firewalling proxy servers – combine functions of both.
14
Blocking Port Numbers Associated with firewalls and proxy servers. Blocked port – no through traffic. Could be from either direction Outgoing traffic blocked Incoming traffic blocked
15
Packet Sniffing Taking data from the network and reading it. Avoidance procedure: Encryption – encoding data so it can’t be read with out unlocking code.
16
IPSec – Internet Protocol Security Network layer All apps that use IP can use IPSec Those apps that operate @ layers above layer 3, cannot use IPSec – such as SSL(layer 7)
17
DES –Data Encryption Std. Encrypts/decrypts 64 bits chunks using 64/56 bit key 1 parity bit _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Going away – less expensive and faster system XXX XXX XX
18
3 DES Improved DES Repeats 3x 56 x 3 = 168 64 x 3 = 192
19
Auditing Tracking events that occur.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.